In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server's TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host.
Advisories
Source ID Title
EUVD EUVD EUVD-2020-5887 In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server's TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host.
Ubuntu USN Ubuntu USN USN-4405-1 GLib Networking vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00213}

epss

{'score': 0.00498}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T12:25:16.135Z

Reserved: 2020-05-28T00:00:00

Link: CVE-2020-13645

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-05-28T12:15:11.173

Modified: 2024-11-21T05:01:40.310

Link: CVE-2020-13645

cve-icon Redhat

Severity : Moderate

Publid Date: 2020-05-04T00:00:00Z

Links: CVE-2020-13645 - Bugzilla

cve-icon OpenCVE Enrichment

No data.