Potential DoS when using ContextLines integration (GHSA-r5w7-f542-q2j4) 10
- Severity:
- Low
Description
The ContextLines integration uses readable streams to more efficiently use memory when reading files. The ContextLines integration is used to attach source context to outgoing events.
The stream was not explicitly closed after use.
Recommendation
Update the @sentry/node package to the latest compatible version. Followings are version details:
- Affected version(s): >= 8.10.0, < 8.49.0
- Patched version(s): 8.49.0
References
Related Issues
- jsdiff has a Denial of Service vulnerability in parsePatch and applyPatch - CVE-2026-24001
- LangChain serialization injection vulnerability enables secret extraction - CVE-2025-68665
- Sentry's sensitive headers are leaked when `sendDefaultPii` is set to `true` (GHSA-6465-jgvq-jhgp) 10 - CVE-2025-65944
- Volto affected by possible DoS by invoking specific URL by anonymous user - CVE-2025-58047
- Tags:
- npm
- @sentry/node
Anything's wrong? Let us know Last updated on January 28, 2025