CVE-2021-20193 18:15 A flaw was found in the src/list.c of tar 1.33 and earlier. This flaw allows an attacker who can submit a crafted input file to tar to cause uncontrolled consumption of memory. The highest threat from this vulnerability is to system availability. Patch available here: https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777 Unreleased for now. We can probably apply it in core-updates now, we should fix it in master also, since grafts don't apply to GNU Guix builds is that OK? GNU Guix packages don't unpack arbitrary tarballs since we hardcode hashes for verification, but still.