A directory traversal problem in the URL decoder of librsvg before 2.56.3 could be used by local or remote attackers to disclose files (on the local filesystem outside of the expected area), as demonstrated by href=“.?../…/…/…/…/…/…/…/…/…/etc/passwd” in an xi:include element.
seclists.org/fulldisclosure/2023/Jul/43
www.openwall.com/lists/oss-security/2023/07/27/1
www.openwall.com/lists/oss-security/2023/09/06/10
bugzilla.suse.com/show_bug.cgi?id=1213502
gitlab.gnome.org/GNOME/librsvg/-/issues/996
gitlab.gnome.org/GNOME/librsvg/-/releases/2.56.3
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/422NTIHIEBRASIG2DWXYBH4ADYMHY626/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R5BCXT5GW6RCL45ZUHUZR4CJG2BAFDVC/
news.ycombinator.com/item?id=37415799
security.netapp.com/advisory/ntap-20230831-0011/
www.canva.dev/blog/engineering/when-url-parsers-disagree-cve-2023-38633/
www.debian.org/security/2023/dsa-5484