A modified, unauthenticated server can send an unterminated string during the establishment of Kerberos transport encryption. When a libpq client application has a Kerberos credential cache and doesn't explicitly disable option "gssencmode", a server can cause libpq to over-read and report an error message containing uninitialized bytes from and following its receive buffer. If libpq's caller somehow makes that message accessible to the attacker, this achieves a disclosure of the over-read bytes. We have not confirmed or ruled out viability of attacks that arrange for a crash or for presence of notable, confidential information in disclosed bytes.
Created postgresql-jdbc tracking bugs for this issue: Affects: fedora-all [bug 2170071]
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:1576 https://access.redhat.com/errata/RHSA-2023:1576
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:1693 https://access.redhat.com/errata/RHSA-2023:1693
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-41862
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:4535 https://access.redhat.com/errata/RHSA-2023:4535