First published: Thu Mar 06 2025(Updated: )
Versions of the package ray before 2.43.0 are vulnerable to Insertion of Sensitive Information into Log File where the redis password is being logged in the standard logging. If the redis password is passed as an argument, it will be logged and could potentially leak the password. This is only exploitable if: 1) Logging is enabled; 2) Redis is using password authentication; 3) Those logs are accessible to an attacker, who can reach that redis instance. **Note:** It is recommended that anyone who is running in this configuration should update to the latest version of Ray, then rotate their redis password.
Credit: report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
Ray | <2.43.0 | |
pip/ray | <2.43.0 | 2.43.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1979 is considered a high severity vulnerability due to the potential exposure of sensitive information, specifically redis passwords.
To mitigate CVE-2025-1979, upgrade to Ray version 2.43.0 or later, where the logging of sensitive information is addressed.
CVE-2025-1979 is classified as an information disclosure vulnerability because it allows sensitive data to be logged.
Ray versions prior to 2.43.0 are affected by CVE-2025-1979 and are vulnerable to sensitive information logging.
CVE-2025-1979 exposes redis passwords if they are passed as arguments in the logging process.