The vulnerability lies in the SanitizeSVG function in kernel/util/misc.go. The function's purpose is to sanitize SVG input to prevent XSS attacks. However, it failed to block certain SVG animation tags like <animate> and <set>. An attacker could exploit this by crafting an SVG file with these tags to dynamically set attributes to malicious values at runtime, for instance, setting an href attribute to a javascript: URL. This would bypass the static checks performed by the sanitizer. The fix, identified in commit 9c4b184bef924f76b4f036663111246f5fb7c95f, directly modifies the SanitizeSVG function to include these animation tags in its blocklist, and also adds checks for javascript: payloads in animation-related attributes. Therefore, util.SanitizeSVG is the vulnerable function.