Affected by GO-2022-0390
and 6 other vulnerabilities
GO-2022-0390: Moby (Docker Engine) started with non-empty inheritable Linux process capabilities in github.com/docker/docker
GO-2022-0985: Docker supplementary group permissions not set up properly, allowing attackers to bypass primary group restrictions in github.com/docker/docker
GO-2022-1107: Container build can leak any path on the host into the container in github.com/docker/docker
GO-2023-1699: Docker Swarm encrypted overlay network may be unauthenticated in github.com/docker/docker
GO-2023-1700: Docker Swarm encrypted overlay network traffic may be unencrypted in github.com/docker/docker
GO-2023-1701: Docker Swarm encrypted overlay network with a single endpoint is unauthenticated in github.com/docker/docker
GO-2024-2914: Moby (Docker Engine) is vulnerable to Ambiguous OCI manifest parsing in github.com/docker/docker
type Args struct {
// ChunkID is an unique number of the chunk ChunkID int `json:"chunk_id"`
// Tests is the set of the strings that are passed as `-check.f` filters Tests []string `json:"tests"`
}
type Result struct {
// ChunkID corresponds to Args.ChunkID ChunkID int `json:"chunk_id"`
// Code is the exit code Code int `json:"code"`
RawLog string `json:"raw_log"`
}