alpine 3.6
access weakness #7

The software specifies permissions for a security-critical resource in a way that allows that resource to be modified or read.

1

Weakness Breakdown


Warning code(s):

Ensure that umask is given most restrictive possible setting.

File Name:

./src/ImageMagick-7.0.5-10/MagickCore/nt-base.h

Context:
# define umask _umask

The registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive licensee of Linus Torvalds, owner of the mark on a world­wide basis.