ALAS2023-2025-1152


Amazon Linux 2023 Security Advisory: ALAS2023-2025-1152
Advisory Released Date: 2025-08-18
Advisory Updated Date: 2025-08-25
Severity: Low

Issue Overview:

NGINX Open Source and NGINX Plus have a vulnerability in the ngx_mail_smtp_module that might allow an unauthenticated attacker to over-read NGINX SMTP authentication process memory; as a result, the server side may leak arbitrary bytes sent in a request to the authentication server. This issue happens during the NGINX SMTP authentication process and requires the attacker to make preparations against the target system to extract the leaked data. The issue affects NGINX only if (1) it is built with the ngx_mail_smtp_module, (2) the smtp_auth directive is configured with method "none," and (3) the authentication server returns the "Auth-Wait" response header.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. (CVE-2025-53859)


Affected Packages:

nginx


Issue Correction:
Run dnf update nginx --releasever 2023.8.20250818 or dnf update --advisory ALAS2023-2025-1152 --releasever 2023.8.20250818 to update your system.
More information on how to update your system can be found on this page: Amazon Linux 2023 documentation

New Packages:
aarch64:
    nginx-mod-stream-debuginfo-1.28.0-1.amzn2023.0.2.aarch64
    nginx-mod-http-xslt-filter-debuginfo-1.28.0-1.amzn2023.0.2.aarch64
    nginx-core-debuginfo-1.28.0-1.amzn2023.0.2.aarch64
    nginx-mod-mail-debuginfo-1.28.0-1.amzn2023.0.2.aarch64
    nginx-mod-http-perl-debuginfo-1.28.0-1.amzn2023.0.2.aarch64
    nginx-mod-http-image-filter-debuginfo-1.28.0-1.amzn2023.0.2.aarch64
    nginx-debuginfo-1.28.0-1.amzn2023.0.2.aarch64
    nginx-mod-mail-1.28.0-1.amzn2023.0.2.aarch64
    nginx-1.28.0-1.amzn2023.0.2.aarch64
    nginx-mod-http-xslt-filter-1.28.0-1.amzn2023.0.2.aarch64
    nginx-mod-http-image-filter-1.28.0-1.amzn2023.0.2.aarch64
    nginx-debugsource-1.28.0-1.amzn2023.0.2.aarch64
    nginx-core-1.28.0-1.amzn2023.0.2.aarch64
    nginx-mod-http-perl-1.28.0-1.amzn2023.0.2.aarch64
    nginx-mod-stream-1.28.0-1.amzn2023.0.2.aarch64
    nginx-mod-devel-1.28.0-1.amzn2023.0.2.aarch64

noarch:
    nginx-filesystem-1.28.0-1.amzn2023.0.2.noarch
    nginx-all-modules-1.28.0-1.amzn2023.0.2.noarch

src:
    nginx-1.28.0-1.amzn2023.0.2.src

x86_64:
    nginx-mod-mail-debuginfo-1.28.0-1.amzn2023.0.2.x86_64
    nginx-mod-stream-1.28.0-1.amzn2023.0.2.x86_64
    nginx-mod-mail-1.28.0-1.amzn2023.0.2.x86_64
    nginx-mod-http-perl-1.28.0-1.amzn2023.0.2.x86_64
    nginx-core-debuginfo-1.28.0-1.amzn2023.0.2.x86_64
    nginx-mod-http-xslt-filter-debuginfo-1.28.0-1.amzn2023.0.2.x86_64
    nginx-mod-stream-debuginfo-1.28.0-1.amzn2023.0.2.x86_64
    nginx-mod-http-perl-debuginfo-1.28.0-1.amzn2023.0.2.x86_64
    nginx-debuginfo-1.28.0-1.amzn2023.0.2.x86_64
    nginx-mod-http-xslt-filter-1.28.0-1.amzn2023.0.2.x86_64
    nginx-core-1.28.0-1.amzn2023.0.2.x86_64
    nginx-1.28.0-1.amzn2023.0.2.x86_64
    nginx-mod-http-image-filter-debuginfo-1.28.0-1.amzn2023.0.2.x86_64
    nginx-mod-devel-1.28.0-1.amzn2023.0.2.x86_64
    nginx-mod-http-image-filter-1.28.0-1.amzn2023.0.2.x86_64
    nginx-debugsource-1.28.0-1.amzn2023.0.2.x86_64

Changelog:

2025-08-25: The severity of this advisory has been changed from medium to low.