The vulnerability described is a denial of service in webtransport-go where closing a session could block indefinitely. The fix involves adding a short deadline to the write operation that sends the session closure message. By comparing the git tags for the last vulnerable version (v0.9.0) and the first patched version (v0.10.0), I identified the commit 0187fa1fd44fde1eae9fd9804f5597a4fb3dddb8 which has the message "set a 10ms write deadline before sending the WT_CLOSE_SESSION capsule". The diff in this commit clearly shows the modification in the CloseWithError function within session.go. The original code made a blocking call to http3.WriteCapsule. The patched code introduces a 10ms deadline using SetWriteDeadline on the underlying stream before attempting to write the capsule. If the write fails (e.g., due to the deadline being exceeded), it now cancels the write on the stream instead of blocking, thus mitigating the denial of service vulnerability. Therefore, the Session.CloseWithError function is the vulnerable function.