Skip to content

chore(deps): update crush to v0.66.1#21716

Open
uniget-bot wants to merge 1 commit intomainfrom
renovate/crush-0.66.x
Open

chore(deps): update crush to v0.66.1#21716
uniget-bot wants to merge 1 commit intomainfrom
renovate/crush-0.66.x

Conversation

@uniget-bot
Copy link
Copy Markdown

This PR contains the following updates:

Package Update Change
crush patch 0.66.00.66.1

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


Release Notes

charmbracelet/crush (crush)

v0.66.1

Compare Source

Small things + killin' bugs

Hey all. This release includes some small goodies and fixes. Let's take a look.

Exited is alised to Quit

When filtering for commands in the command dialog, "exit" will be properly return the "quit" command.

Screenshot 2026-05-08 at 18 10 35

New flat_rate provider config

If you want to skip cost calculation for a given provider, you can now set it as a flat rate provider on your crush.json. This is useful when using subscription, where the cost is theorically zero as you're not really paying per token.

This is nicely done by @​huaiyuWangh.

{
  "providers": {
    "my-favorite-provider": {
      "flat_rate": true
    }
  }
}

Show error if project initialization fails

Another one from @​huaiyuWangh. If the project initialization fails, Crush will now properly show in the staatus bar that it failed.

Fixed model stopping after Glob

In certain scenarios, the model could stop working when no files were returned in a glob tool call. We now fixed it, so the model will keep working.

Fixed context window issue with background jobs

When the model inspected the output of a background job, it would fill the context window if the output is too large. We're doing the same as regular Bash command: truncating large output to something reasonable.

Fixed behavior on invalid tool call

When the model called a tool with invalid parameters, it could hang the session. @​mkaaad worked on a fix to ensure the error is reported to the model so it can continue to work.


There are a few more fixes, but those make a good highlight.

Enjoy your weekend and keep Crushing!
Charm ™️

Changelog

Fixed
Docs

Verifying the artifacts

First, download the checksums.txt file and the checksums.txt.sigstore.json file files, for example, with wget:

wget 'https://github.com/charmbracelet/crush/releases/download/v0.66.1/checksums.txt'
wget 'https://github.com/charmbracelet/crush/releases/download/v0.66.1/checksums.txt.sigstore.json'

Then, verify it using cosign:

cosign verify-blob \
  --certificate-identity 'https://github.com/charmbracelet/meta/.github/workflows/goreleaser.yml@refs/heads/main' \
  --certificate-oidc-issuer 'https://token.actions.githubusercontent.com' \
  --bundle 'checksums.txt.sigstore.json' \
  ./checksums.txt

If the output is Verified OK, you can safely use it to verify the checksums of other artifacts you downloaded from the release using sha256sum:

sha256sum --ignore-missing -c checksums.txt

Done! You artifacts are now verified!

The Charm logo

Thoughts? Questions? We love hearing from you. Feel free to reach out on X, Discord, Slack, The Fediverse, Bluesky.


Configuration

📅 Schedule: (in timezone Europe/Berlin)

  • Branch creation
    • At any time (no schedule defined)
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Mend Renovate.

Copy link
Copy Markdown

@nicholasdille-bot nicholasdille-bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Auto-approved because label type/renovate is present.

@github-actions
Copy link
Copy Markdown

github-actions Bot commented May 9, 2026

🔍 Vulnerabilities of ghcr.io/uniget-org/tools/crush:0.66.1

📦 Image Reference ghcr.io/uniget-org/tools/crush:0.66.1
digestsha256:cd21d8ab91e47db884198d43f309694f549650144e850df0c1d5563f0d3a6e39
vulnerabilitiescritical: 0 high: 3 medium: 1 low: 1
platformlinux/amd64
size25 MB
packages241
critical: 0 high: 2 medium: 0 low: 0 github.com/u-root/u-root 0.14.1-0.20250807200646-5e7721023dc7 (golang)

pkg:golang/github.com/u-root/u-root@0.14.1-0.20250807200646-5e7721023dc7

high 7.5: CVE--2020--7669 OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities

Affected range<=v7.0.0
Fixed versionNot Fixed
CVSS Score7.5
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
EPSS Score0.346%
EPSS Percentile57th percentile
Description

This affects all versions of package github.com/u-root/u-root/pkg/tarutil. It is vulnerable to both leading and non-leading relative path traversal attacks in tar file extraction.

high 7.5: CVE--2020--7665 OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities

Affected range<=7.0.0
Fixed versionNot Fixed
CVSS Score7.5
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
EPSS Score0.149%
EPSS Percentile35th percentile
Description

This affects all versions of package github.com/u-root/u-root/pkg/uzip. It is vulnerable to both leading and non-leading relative path traversal attacks in zip file extraction.

critical: 0 high: 1 medium: 1 low: 0 golang.org/x/image 0.38.0 (golang)

pkg:golang/golang.org/x/image@0.38.0

high : CVE--2026--33813

Affected range<0.39.0
Fixed version0.39.0
EPSS Score0.064%
EPSS Percentile20th percentile
Description

Parsing a WEBP image with an invalid, large size panics on 32-bit platforms.

medium : CVE--2026--33812

Affected range<0.39.0
Fixed version0.39.0
EPSS Score0.013%
EPSS Percentile2nd percentile
Description

Parsing a malicious font file can cause excessive memory allocation.

critical: 0 high: 0 medium: 0 low: 1 github.com/disintegration/imaging 1.6.2 (golang)

pkg:golang/github.com/disintegration/imaging@1.6.2

low : CVE--2023--36308 Improper Validation of Array Index

Affected range<=1.6.2
Fixed versionNot Fixed
EPSS Score0.040%
EPSS Percentile12th percentile
Description

Disintegration Imaging 1.6.2 allows attackers to cause a panic (because of an integer index out of range during a Grayscale call) via a crafted TIFF file to the scan function of scanner.go. NOTE: it is unclear whether there are common use cases in which this panic could have any security consequence

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants