Potential unbounded server-side SNI SslContext cache growth in Vert.x TLS handling, with possible resource-exhaustion / DoS impact.
On affected versions, matching server-side SNI names are cached via computeIfAbsent(serverName, ...) in a serverName-keyed SslContext cache, and I could not find any bound, TTL, or eviction for that cache.
The implementation differs slightly by branch, but the same sink appears to be present in released versions 4.3.4 through 5.0.8:
- 4.3.x: SSLHelper
- 4.4.x / 4.5.x: SslChannelProvider
- 5.0.x and current master: SslContextProvider
It appears that when server-side SNI is enabled, and wildcard or otherwise broad hostname mappings are used, an unauthenticated client can send many distinct matching SNI names and cause the server to retain increasing numbers of SslContext entries over time, leading to increasing memory consumption and possible DoS conditions.
A check was performed on the related TCP SNI path across affected versions, the QUIC SNI path on 5.x, and the wildcard hostname resolution helpers used during certificate selection.
setSsl(true) and setSni(true).Local observations:
- initial sniEntrySize() = 0
- after 20 unique matching names: 20
- after 40 unique matching names: 40
- repeating previously seen matching names did not grow the cache further
- non-matching SNI names did not create new cache entries
Affected released versions confirmed on origin:
- 4.3.4 through 4.3.8
- 4.4.0 through 4.4.9
- 4.5.0 through 4.5.25
- 5.0.0 through 5.0.8
Not affected by the same sink:
- 4.0.x through 4.2.x
- 4.3.0 through 4.3.3
{
"severity": "MODERATE",
"cwe_ids": [
"CWE-295",
"CWE-770"
],
"github_reviewed": true,
"github_reviewed_at": "2026-05-09T00:38:30Z",
"nvd_published_at": "2026-05-06T10:16:26Z"
}