Affected by GO-2022-0390
and 7 other vulnerabilities
GO-2022-0390: Moby (Docker Engine) started with non-empty inheritable Linux process capabilities in github.com/docker/docker
GO-2022-0640: Arbitrary Code Execution in github.com/docker/docker
GO-2022-0649: Symlink Attack in Libcontainer and Docker Engine in github.com/docker/docker
GO-2022-0708: Arbitrary File Override in Docker Engine in github.com/docker/docker
GO-2022-0751: Path Traversal in Docker in github.com/docker/docker
GO-2022-0985: Docker supplementary group permissions not set up properly, allowing attackers to bypass primary group restrictions in github.com/docker/docker
GO-2022-1107: Container build can leak any path on the host into the container in github.com/docker/docker
GO-2024-2914: Moby (Docker Engine) is vulnerable to Ambiguous OCI manifest parsing in github.com/docker/docker
AddWriter adds new io.WriteCloser for stream.
If stream is "", then all writes proceed as is. Otherwise every line from
input will be packed to serialized jsonlog.JSONLog.