Skip to content

Commit a3c6be8

Browse files
committed
chmod 700 instead of 744 and kill debug messages
1 parent 55e153b commit a3c6be8

File tree

2 files changed

+2
-3
lines changed

2 files changed

+2
-3
lines changed

app/src/main/java/fuzion24/device/vulnerability/vulnerabilities/framework/media/StageFright.java

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,6 @@ public class StageFright {
3131
}
3232

3333
private static void exec(String executionCommand) throws Exception {
34-
Log.d(TAG, "Running shell command: " + executionCommand);
3534
Process p = Runtime.getRuntime().exec(executionCommand);
3635
p.waitFor();
3736
}
@@ -49,7 +48,7 @@ public static List<VulnerabilityTest> getTests(Context context) {
4948
final String extractedBinaryTester = dataDir.getAbsolutePath() + File.separator + getNativeAppName();
5049
extractAsset(context, "stagefright" + File.separator + getNativeAppName(),
5150
extractedBinaryTester);
52-
exec("chmod 744 " + extractedBinaryTester);
51+
exec("chmod 700 " + extractedBinaryTester);
5352

5453
for (final String mediaFile : stagefrightMediaFiles) {
5554

app/src/main/java/fuzion24/device/vulnerability/vulnerabilities/helper/CrashCheck.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ private static String extractCrashCheckBinary(Context context) throws IOExceptio
3535
File dataDir = context.getFilesDir();
3636
String extractedCrashCheck = dataDir.getAbsolutePath() + File.separator + getCrashCheckAppName();
3737
extractAsset(context, "crashCheck" + File.separator + getCrashCheckAppName(), extractedCrashCheck, false);
38-
Process p = Runtime.getRuntime().exec("chmod 744 " + extractedCrashCheck);
38+
Process p = Runtime.getRuntime().exec("chmod 700 " + extractedCrashCheck);
3939

4040
try {
4141
p.waitFor();

0 commit comments

Comments
 (0)