Potential DoS when using ContextLines integration (GHSA-r5w7-f542-q2j4)
- Severity:
- Low
Description
The ContextLines integration uses readable streams to more efficiently use memory when reading files. The ContextLines integration is used to attach source context to outgoing events.
The stream was not explicitly closed after use.
Recommendation
Update the @sentry/solidstart package to the latest compatible version. Followings are version details:
- Affected version(s): >= 8.10.0, < 8.49.0
- Patched version(s): 8.49.0
References
Related Issues
- Sentry's sensitive headers are leaked when `sendDefaultPii` is set to `true` (GHSA-6465-jgvq-jhgp) - CVE-2025-65944
- HackMD MCP Server has Server-Side Request Forgery (SSRF) vulnerability - CVE-2025-59155
- OpenList (frontend) allows XSS Attacks in the built-in Markdown Viewer - CVE-2025-50183
- tarteaucitron.js allows UI manipulation via unrestricted CSS injection - CVE-2025-31138
- Tags:
- npm
- @sentry/solidstart
Anything's wrong? Let us know Last updated on January 28, 2025