Amazon Linux 2023 Security Advisory: ALAS2023-2025-1152
Advisory Released Date: 2025-08-18
Advisory Updated Date: 2025-08-25
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_mail_smtp_module that might allow an unauthenticated attacker to over-read NGINX SMTP authentication process memory; as a result, the server side may leak arbitrary bytes sent in a request to the authentication server. This issue happens during the NGINX SMTP authentication process and requires the attacker to make preparations against the target system to extract the leaked data. The issue affects NGINX only if (1) it is built with the ngx_mail_smtp_module, (2) the smtp_auth directive is configured with method "none," and (3) the authentication server returns the "Auth-Wait" response header.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. (CVE-2025-53859)
Affected Packages:
nginx
Issue Correction:
Run dnf update nginx --releasever 2023.8.20250818 or dnf update --advisory ALAS2023-2025-1152 --releasever 2023.8.20250818 to update your system.
More information on how to update your system can be found on this page: Amazon Linux 2023 documentation
aarch64:
nginx-mod-stream-debuginfo-1.28.0-1.amzn2023.0.2.aarch64
nginx-mod-http-xslt-filter-debuginfo-1.28.0-1.amzn2023.0.2.aarch64
nginx-core-debuginfo-1.28.0-1.amzn2023.0.2.aarch64
nginx-mod-mail-debuginfo-1.28.0-1.amzn2023.0.2.aarch64
nginx-mod-http-perl-debuginfo-1.28.0-1.amzn2023.0.2.aarch64
nginx-mod-http-image-filter-debuginfo-1.28.0-1.amzn2023.0.2.aarch64
nginx-debuginfo-1.28.0-1.amzn2023.0.2.aarch64
nginx-mod-mail-1.28.0-1.amzn2023.0.2.aarch64
nginx-1.28.0-1.amzn2023.0.2.aarch64
nginx-mod-http-xslt-filter-1.28.0-1.amzn2023.0.2.aarch64
nginx-mod-http-image-filter-1.28.0-1.amzn2023.0.2.aarch64
nginx-debugsource-1.28.0-1.amzn2023.0.2.aarch64
nginx-core-1.28.0-1.amzn2023.0.2.aarch64
nginx-mod-http-perl-1.28.0-1.amzn2023.0.2.aarch64
nginx-mod-stream-1.28.0-1.amzn2023.0.2.aarch64
nginx-mod-devel-1.28.0-1.amzn2023.0.2.aarch64
noarch:
nginx-filesystem-1.28.0-1.amzn2023.0.2.noarch
nginx-all-modules-1.28.0-1.amzn2023.0.2.noarch
src:
nginx-1.28.0-1.amzn2023.0.2.src
x86_64:
nginx-mod-mail-debuginfo-1.28.0-1.amzn2023.0.2.x86_64
nginx-mod-stream-1.28.0-1.amzn2023.0.2.x86_64
nginx-mod-mail-1.28.0-1.amzn2023.0.2.x86_64
nginx-mod-http-perl-1.28.0-1.amzn2023.0.2.x86_64
nginx-core-debuginfo-1.28.0-1.amzn2023.0.2.x86_64
nginx-mod-http-xslt-filter-debuginfo-1.28.0-1.amzn2023.0.2.x86_64
nginx-mod-stream-debuginfo-1.28.0-1.amzn2023.0.2.x86_64
nginx-mod-http-perl-debuginfo-1.28.0-1.amzn2023.0.2.x86_64
nginx-debuginfo-1.28.0-1.amzn2023.0.2.x86_64
nginx-mod-http-xslt-filter-1.28.0-1.amzn2023.0.2.x86_64
nginx-core-1.28.0-1.amzn2023.0.2.x86_64
nginx-1.28.0-1.amzn2023.0.2.x86_64
nginx-mod-http-image-filter-debuginfo-1.28.0-1.amzn2023.0.2.x86_64
nginx-mod-devel-1.28.0-1.amzn2023.0.2.x86_64
nginx-mod-http-image-filter-1.28.0-1.amzn2023.0.2.x86_64
nginx-debugsource-1.28.0-1.amzn2023.0.2.x86_64
2025-08-25: The severity of this advisory has been changed from medium to low.