Potential DoS when using ContextLines integration (GHSA-r5w7-f542-q2j4) 7
- Severity:
- Low
Description
The ContextLines integration uses readable streams to more efficiently use memory when reading files. The ContextLines integration is used to attach source context to outgoing events.
The stream was not explicitly closed after use.
Recommendation
Update the @sentry/bun package to the latest compatible version. Followings are version details:
- Affected version(s): >= 8.10.0, < 8.49.0
- Patched version(s): 8.49.0
References
Related Issues
- Sentry's sensitive headers are leaked when `sendDefaultPii` is set to `true` (GHSA-6465-jgvq-jhgp) 7 - CVE-2025-65944
- tarteaucitron.js vulnerable to DOM Clobbering via document.currentScript - CVE-2025-48939
- Potential DoS when using ContextLines integration (GHSA-r5w7-f542-q2j4) 9 - Vulnerability
- Potential DoS when using ContextLines integration (GHSA-r5w7-f542-q2j4) 8 - Vulnerability
- Tags:
- npm
- @sentry/bun
Anything's wrong? Let us know Last updated on January 28, 2025