Affected by GO-2022-0390
and 12 other vulnerabilities
GO-2022-0390: Moby (Docker Engine) started with non-empty inheritable Linux process capabilities in github.com/docker/docker
GO-2022-0638: Information Exposure in Docker Engine in github.com/docker/docker
GO-2022-0647: Arbitrary File Write in Libcontainer in github.com/docker/docker
GO-2022-0649: Symlink Attack in Libcontainer and Docker Engine in github.com/docker/docker
GO-2022-0708: Arbitrary File Override in Docker Engine in github.com/docker/docker
GO-2022-0985: Docker supplementary group permissions not set up properly, allowing attackers to bypass primary group restrictions in github.com/docker/docker
GO-2022-1107: Container build can leak any path on the host into the container in github.com/docker/docker
GO-2024-2521: Moby Docker cp broken with debian containers in github.com/docker/docker
GO-2024-2913: Unexpected chmod of host files via 'docker cp' in Moby Docker Engine in github.com/docker/docker
GO-2024-2914: Moby (Docker Engine) is vulnerable to Ambiguous OCI manifest parsing in github.com/docker/docker
GO-2025-3829: Moby firewalld reload removes bridge network isolation in github.com/docker/docker
GO-2026-4883: Moby has an Off-by-one error in its plugin privilege validation in github.com/docker/docker
GO-2026-4887: Moby has AuthZ plugin bypass when provided oversized request bodies in github.com/docker/docker
CopyFileWithTar emulates the behavior of the 'cp' command-line
for a single file. It copies a regular file from path `src` to
path `dst`, and preserves all its metadata.
If `dst` ends with a trailing slash '/', the final destination path
will be `dst/base(src)`.
CopyWithTar creates a tar archive of filesystem path `src`, and
unpacks it at filesystem path `dst`.
The archive is streamed directly with fixed buffering and no
intermediary disk IO.