libxslt through 1.1.33 allows bypass of a protection mechanism because callers of xsltCheckRead and xsltCheckWrite permit access even upon receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL that is not actually invalid and is subsequently loaded.
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://usn.ubuntu.com/3947-2/
https://usn.ubuntu.com/3947-1/
https://security.netapp.com/advisory/ntap-20191017-0001/
https://lists.debian.org/debian-lts-announce/2019/04/msg00016.html
https://gitlab.gnome.org/GNOME/libxslt/commit/e03553605b45c88f0b4b2980adfbbb8f6fca2fd6
http://www.openwall.com/lists/oss-security/2019/04/23/5
http://www.openwall.com/lists/oss-security/2019/04/22/1
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00025.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00048.html