The vulnerability CVE-2020-15719 describes an improper certificate validation flaw in libldap, specifically in how it handles Common Names (CN) and Subject Alternative Names (SAN) when RFC6125 support is asserted by third-party packages. The fetched OpenLDAP bug report (9266) and the Red Hat Bugzilla entry (1740070) discuss this issue. The crucial piece of evidence is the patch file (attachment.cgi?id=734 from the OpenLDAP bug tracker), which shows the exact code changes in libraries/libldap/tls_o.c within the function tlso_session_chkhost. The removed sections of this function clearly demonstrate the old, vulnerable logic: a custom implementation for checking SANs, and if that check didn't result in a match, a subsequent fallback to checking the CN. This fallback, when SANs are present but don't match, is the core of the vulnerability. The patch replaces this custom logic with calls to OpenSSL's X509_check_host and X509_check_ip functions, which are presumed to handle this correctly. Therefore, tlso_session_chkhost is identified as the vulnerable function, with the evidence being the removed code that implemented the incorrect fallback.