GHSA-2f2x-8mwp-p2gc

Suggest an improvement
Source
https://github.com/advisories/GHSA-2f2x-8mwp-p2gc
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-2f2x-8mwp-p2gc/GHSA-2f2x-8mwp-p2gc.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-2f2x-8mwp-p2gc
Aliases
Published
2026-02-12T15:29:11Z
Modified
2026-02-12T15:56:17.501804Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
Summary
webtransport-go: Memory Exhaustion Attack due to Missing Cleanup of Streams Map
Details

Summary

An attacker can cause unbounded memory consumption repeatedly creating and closing many WebTransport streams. Closed streams were not removed from an internal session map, preventing garbage collection of their resources.

Details

webtransport-go maintains an internal map tracking WebTransport streams (both unidirectional and bidirectional) belonging to a session. In affected versions, entries for closed streams were not removed from this map, causing the map to grow indefinitely as streams were created and closed.

A malicious peer can exploit this by opening large numbers of streams and closing them, leading to steady memory growth proportional to the number of closed streams.

The Fix

webtransport-go now removes closed streams from the internal map upon closure. This allows the associated resources to be garbage collected, bounding memory usage to active streams only.

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-401",
        "CWE-459"
    ],
    "github_reviewed_at": "2026-02-12T15:29:11Z",
    "severity": "MODERATE",
    "github_reviewed": true
}
References

Affected packages

Go / github.com/quic-go/webtransport-go

Package

Name
github.com/quic-go/webtransport-go
View open source insights on deps.dev
Purl
pkg:golang/github.com/quic-go/webtransport-go

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.10.0

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-2f2x-8mwp-p2gc/GHSA-2f2x-8mwp-p2gc.json"
last_known_affected_version_range
"<= 0.9.0"