Skip to content

chore(deps): update crush to v0.69.1#21965

Merged
nicholasdille merged 1 commit into
mainfrom
renovate/crush-0.69.x
May 18, 2026
Merged

chore(deps): update crush to v0.69.1#21965
nicholasdille merged 1 commit into
mainfrom
renovate/crush-0.69.x

Conversation

@uniget-bot
Copy link
Copy Markdown

This PR contains the following updates:

Package Update Change
crush patch 0.69.00.69.1

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


Release Notes

charmbracelet/crush (crush)

v0.69.1

Compare Source

It’s Perf Time

This release is all about juicin’ UI perf. We did a ton of work around it, and it should be particularly noticeable with long sessions, long messages, long, open-toggled thinking blocks, mouse selection, scrolling and stuff like that.

We always strive to make the Crush user experience top-notch, so if you notice any places where perf is suffering please let us know!

Have a great weekend,
The Charm Team

Changelog

Fixed
Other stuff

Verifying the artifacts

First, download the checksums.txt file and the checksums.txt.sigstore.json file files, for example, with wget:

wget 'https://github.com/charmbracelet/crush/releases/download/v0.69.1/checksums.txt'
wget 'https://github.com/charmbracelet/crush/releases/download/v0.69.1/checksums.txt.sigstore.json'

Then, verify it using cosign:

cosign verify-blob \
  --certificate-identity 'https://github.com/charmbracelet/meta/.github/workflows/goreleaser.yml@refs/heads/main' \
  --certificate-oidc-issuer 'https://token.actions.githubusercontent.com' \
  --bundle 'checksums.txt.sigstore.json' \
  ./checksums.txt

If the output is Verified OK, you can safely use it to verify the checksums of other artifacts you downloaded from the release using sha256sum:

sha256sum --ignore-missing -c checksums.txt

Done! You artifacts are now verified!

The Charm logo

Thoughts? Questions? We love hearing from you. Feel free to reach out on X, Discord, Slack, The Fediverse, Bluesky.


Configuration

📅 Schedule: (in timezone Europe/Berlin)

  • Branch creation
    • At any time (no schedule defined)
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Mend Renovate.

Copy link
Copy Markdown

@nicholasdille-bot nicholasdille-bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Auto-approved because label type/renovate is present.

@github-actions
Copy link
Copy Markdown

🔍 Vulnerabilities of ghcr.io/uniget-org/tools/crush:0.69.1

📦 Image Reference ghcr.io/uniget-org/tools/crush:0.69.1
digestsha256:5a319003a10542db698676e7019b4156f7476b32b6a03409daa9f2756088f5ae
vulnerabilitiescritical: 0 high: 3 medium: 1 low: 1
platformlinux/amd64
size25 MB
packages241
critical: 0 high: 2 medium: 0 low: 0 github.com/u-root/u-root 0.14.1-0.20250807200646-5e7721023dc7 (golang)

pkg:golang/github.com/u-root/u-root@0.14.1-0.20250807200646-5e7721023dc7

high 7.5: CVE--2020--7669 OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities

Affected range<=v7.0.0
Fixed versionNot Fixed
CVSS Score7.5
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
EPSS Score0.346%
EPSS Percentile57th percentile
Description

This affects all versions of package github.com/u-root/u-root/pkg/tarutil. It is vulnerable to both leading and non-leading relative path traversal attacks in tar file extraction.

high 7.5: CVE--2020--7665 OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities

Affected range<=7.0.0
Fixed versionNot Fixed
CVSS Score7.5
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
EPSS Score0.149%
EPSS Percentile35th percentile
Description

This affects all versions of package github.com/u-root/u-root/pkg/uzip. It is vulnerable to both leading and non-leading relative path traversal attacks in zip file extraction.

critical: 0 high: 1 medium: 1 low: 0 golang.org/x/image 0.38.0 (golang)

pkg:golang/golang.org/x/image@0.38.0

high : CVE--2026--33813

Affected range<0.39.0
Fixed version0.39.0
EPSS Score0.063%
EPSS Percentile20th percentile
Description

Parsing a WEBP image with an invalid, large size panics on 32-bit platforms.

medium : CVE--2026--33812

Affected range<0.39.0
Fixed version0.39.0
EPSS Score0.012%
EPSS Percentile2nd percentile
Description

Parsing a malicious font file can cause excessive memory allocation.

critical: 0 high: 0 medium: 0 low: 1 github.com/disintegration/imaging 1.6.2 (golang)

pkg:golang/github.com/disintegration/imaging@1.6.2

low : CVE--2023--36308 Improper Validation of Array Index

Affected range<=1.6.2
Fixed versionNot Fixed
EPSS Score0.040%
EPSS Percentile12th percentile
Description

Disintegration Imaging 1.6.2 allows attackers to cause a panic (because of an integer index out of range during a Grayscale call) via a crafted TIFF file to the scan function of scanner.go. NOTE: it is unclear whether there are common use cases in which this panic could have any security consequence

@github-actions
Copy link
Copy Markdown

Attempting automerge. See https://github.com/uniget-org/tools/actions/runs/25952280280.

@github-actions
Copy link
Copy Markdown

PR is unstable and cannot be merged. See https://github.com/uniget-org/tools/actions/runs/25952280280.

@nicholasdille nicholasdille merged commit 7f52469 into main May 18, 2026
9 of 10 checks passed
@nicholasdille nicholasdille deleted the renovate/crush-0.69.x branch May 18, 2026 07:45
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants