Skip to content

chore(deps): update dependency tilt-dev/tilt to v0.37.0#19510

Merged
nicholasdille merged 1 commit intomainfrom
renovate/tilt-dev-tilt-0.x
Mar 5, 2026
Merged

chore(deps): update dependency tilt-dev/tilt to v0.37.0#19510
nicholasdille merged 1 commit intomainfrom
renovate/tilt-dev-tilt-0.x

Conversation

@uniget-bot
Copy link
Copy Markdown

This PR contains the following updates:

Package Update Change
tilt-dev/tilt minor 0.36.30.37.0

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


Release Notes

tilt-dev/tilt (tilt-dev/tilt)

v0.37.0

Compare Source

Install Tilt ⬇️ | Upgrade Tilt ⬆️ | Tilt Extensions 🧰

Changelog


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

Copy link
Copy Markdown

@nicholasdille-bot nicholasdille-bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Auto-approved because label type/renovate is present.

@github-actions
Copy link
Copy Markdown

github-actions Bot commented Mar 5, 2026

🔍 Vulnerabilities of ghcr.io/uniget-org/tools/tilt:0.37.0

📦 Image Reference ghcr.io/uniget-org/tools/tilt:0.37.0
digestsha256:9b5832dd2dccd75281af550bd49682e2a76f13f5f066e1b06442db11dd7a555f
vulnerabilitiescritical: 1 high: 2 medium: 0 low: 0
platformlinux/amd64
size33 MB
packages220
critical: 1 high: 0 medium: 0 low: 0 stdlib 1.25.6 (golang)

pkg:golang/stdlib@1.25.6

critical : CVE--2025--68121

Affected range>=1.25.0-0
<1.25.7
Fixed version1.25.7
Description

During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.

critical: 0 high: 1 medium: 0 low: 0 github.com/whilp/git-urls 1.0.0 (golang)

pkg:golang/github.com/whilp/git-urls@1.0.0

high 7.5: CVE--2023--46402 Inefficient Regular Expression Complexity

Affected range<=1.0.1
Fixed versionNot Fixed
CVSS Score7.5
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

git-urls version 1.0.1 is vulnerable to ReDOS (Regular Expression Denial of Service) in Go package.

critical: 0 high: 1 medium: 0 low: 0 github.com/docker/cli 28.5.0+incompatible (golang)

pkg:golang/github.com/docker/cli@28.5.0+incompatible

high 7.0: CVE--2025--15558 Uncontrolled Search Path Element

Affected range>=19.03.0
<29.2.0
Fixed version29.2.0
CVSS Score7
CVSS VectorCVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Description

This issue affects Docker CLI through 29.1.5

Impact

Docker CLI for Windows searches for plugin binaries in C:\ProgramData\Docker\cli-plugins, a directory that does not exist by default. A low-privileged attacker can create this directory and place malicious CLI plugin binaries (docker-compose.exe, docker-buildx.exe, etc.) that are executed when a victim user opens Docker Desktop or invokes Docker CLI plugin features, and allow privilege-escalation if the docker CLI is executed as a privileged user.

This issue affects Docker CLI through v29.1.5 (fixed in v29.2.0). It impacts Windows binaries acting as a CLI plugin manager via the github.com/docker/cli/cli-plugins/manager package, which is consumed by downstream projects such as Docker Compose.

Docker Compose became affected starting in v2.31.0, when it incorporated the relevant CLI plugin manager code (see docker/compose#12300), and is fixed in v5.1.0.

This issue does not impact non-Windows binaries or projects that do not use the plugin manager code.

Patches

Fixed version starts with 29.2.0

This issue was fixed in docker/cli@1375933 (docker/cli#6713), which removed %PROGRAMDATA%\Docker\cli-plugins from the list of paths used for plugin-discovery on Windows.

Workarounds

None

Resources

Credits

Nitesh Surana (niteshsurana.com) of Trend Research of TrendAI

@nicholasdille nicholasdille merged commit 5d95101 into main Mar 5, 2026
9 of 10 checks passed
@nicholasdille nicholasdille deleted the renovate/tilt-dev-tilt-0.x branch March 5, 2026 08:44
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants