Potential DoS when using ContextLines integration (GHSA-r5w7-f542-q2j4)
- Severity:
- Low
Description
The ContextLines integration uses readable streams to more efficiently use memory when reading files. The ContextLines integration is used to attach source context to outgoing events.
The stream was not explicitly closed after use.
Recommendation
Update the @sentry/solidstart
package to the latest compatible version. Followings are version details:
- Affected version(s): >= 8.10.0, < 8.49.0
- Patched version(s): 8.49.0
References
Related Issues
- HackMD MCP Server has Server-Side Request Forgery (SSRF) vulnerability - CVE-2025-59155
- tarteaucitron.js allows UI manipulation via unrestricted CSS injection - CVE-2025-31138
- Predictable results in nanoid generation when given non-integer values - CVE-2024-55565
- happy-dom allows for server side code to be executed by a <script> tag - CVE-2024-51757
- Tags:
- npm
- @sentry/solidstart
Anything's wrong? Let us know Last updated on January 28, 2025