Skip to content

Commit

Permalink
Mon Mar 11 01:06:44 PDT 2024
Browse files Browse the repository at this point in the history
  • Loading branch information
Pwn9uin committed Mar 11, 2024
1 parent adfd18f commit 4345abd
Show file tree
Hide file tree
Showing 4 changed files with 6 additions and 6 deletions.
2 changes: 1 addition & 1 deletion docs/2024-03-10/Android-1day-Exploit-Analysis-ko.html
Original file line number Diff line number Diff line change
Expand Up @@ -1537,7 +1537,7 @@ <h2 id="54-bypass-selinux">5.4 Bypass SELinux</h2>

<p><br /></p>

<h3 id="521-how-selinux-works">5.2.1 How SELinux works</h3>
<h3 id="541-how-selinux-works">5.4.1 How SELinux works</h3>

<p>SELinux는 아래와 같은 순서로 동작한다.</p>

Expand Down
4 changes: 2 additions & 2 deletions docs/feed.xml
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="4.2.0">Jekyll</generator><link href="http://ufo.stealien.com/feed.xml" rel="self" type="application/atom+xml" /><link href="http://ufo.stealien.com/" rel="alternate" type="text/html" /><updated>2024-03-11T01:03:33-07:00</updated><id>http://ufo.stealien.com/feed.xml</id><title type="html">STEALIEN Technical Blog</title><subtitle>첨단기술을 간편하게 제공하는 기업, 스틸리언이 운영하는 기술블로그입니다.</subtitle><entry xml:lang="ko"><title type="html">Android 1day Exploit Analysis (CVE-2019-2215)</title><link href="http://ufo.stealien.com/2024-03-10/Android-1day-Exploit-Analysis-ko" rel="alternate" type="text/html" title="Android 1day Exploit Analysis (CVE-2019-2215)" /><published>2024-03-10T08:00:00-07:00</published><updated>2024-03-10T08:00:00-07:00</updated><id>http://ufo.stealien.com/2024-03-10/Android-1day-Exploit-Analysis-ko</id><content type="html" xml:base="http://ufo.stealien.com/2024-03-10/Android-1day-Exploit-Analysis-ko">&lt;h1 id=&quot;1-introduction&quot;&gt;1. Introduction&lt;/h1&gt;
<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="4.2.0">Jekyll</generator><link href="http://ufo.stealien.com/feed.xml" rel="self" type="application/atom+xml" /><link href="http://ufo.stealien.com/" rel="alternate" type="text/html" /><updated>2024-03-11T01:06:42-07:00</updated><id>http://ufo.stealien.com/feed.xml</id><title type="html">STEALIEN Technical Blog</title><subtitle>첨단기술을 간편하게 제공하는 기업, 스틸리언이 운영하는 기술블로그입니다.</subtitle><entry xml:lang="ko"><title type="html">Android 1day Exploit Analysis (CVE-2019-2215)</title><link href="http://ufo.stealien.com/2024-03-10/Android-1day-Exploit-Analysis-ko" rel="alternate" type="text/html" title="Android 1day Exploit Analysis (CVE-2019-2215)" /><published>2024-03-10T08:00:00-07:00</published><updated>2024-03-10T08:00:00-07:00</updated><id>http://ufo.stealien.com/2024-03-10/Android-1day-Exploit-Analysis-ko</id><content type="html" xml:base="http://ufo.stealien.com/2024-03-10/Android-1day-Exploit-Analysis-ko">&lt;h1 id=&quot;1-introduction&quot;&gt;1. Introduction&lt;/h1&gt;

&lt;p&gt;평소에 관심이 많았던 Android 커널 exploit을 공부해보고자 이 게시물을 작성한다.&lt;/p&gt;

Expand Down Expand Up @@ -1448,7 +1448,7 @@ static void ep_remove_wait_queue(struct eppoll_entry *pwq)

&lt;p&gt;&lt;br /&gt;&lt;/p&gt;

&lt;h3 id=&quot;521-how-selinux-works&quot;&gt;5.2.1 How SELinux works&lt;/h3&gt;
&lt;h3 id=&quot;541-how-selinux-works&quot;&gt;5.4.1 How SELinux works&lt;/h3&gt;

&lt;p&gt;SELinux는 아래와 같은 순서로 동작한다.&lt;/p&gt;

Expand Down
2 changes: 1 addition & 1 deletion docs/id/2024-03-10/Android-1day-Exploit-Analysis-ko.html
Original file line number Diff line number Diff line change
Expand Up @@ -1537,7 +1537,7 @@ <h2 id="54-bypass-selinux">5.4 Bypass SELinux</h2>

<p><br /></p>

<h3 id="521-how-selinux-works">5.2.1 How SELinux works</h3>
<h3 id="541-how-selinux-works">5.4.1 How SELinux works</h3>

<p>SELinux는 아래와 같은 순서로 동작한다.</p>

Expand Down
4 changes: 2 additions & 2 deletions docs/id/feed.xml
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="4.2.0">Jekyll</generator><link href="http://ufo.stealien.com/id/feed.xml" rel="self" type="application/atom+xml" /><link href="http://ufo.stealien.com/id/" rel="alternate" type="text/html" /><updated>2024-03-11T01:03:33-07:00</updated><id>http://ufo.stealien.com/feed.xml</id><title type="html">STEALIEN Technical Blog</title><subtitle>첨단기술을 간편하게 제공하는 기업, 스틸리언이 운영하는 기술블로그입니다.</subtitle><entry xml:lang="ko"><title type="html">Android 1day Exploit Analysis (CVE-2019-2215)</title><link href="http://ufo.stealien.com/id/2024-03-10/Android-1day-Exploit-Analysis-ko" rel="alternate" type="text/html" title="Android 1day Exploit Analysis (CVE-2019-2215)" /><published>2024-03-10T08:00:00-07:00</published><updated>2024-03-10T08:00:00-07:00</updated><id>http://ufo.stealien.com/2024-03-10/Android-1day-Exploit-Analysis-ko</id><content type="html" xml:base="http://ufo.stealien.com/2024-03-10/Android-1day-Exploit-Analysis-ko">&lt;h1 id=&quot;1-introduction&quot;&gt;1. Introduction&lt;/h1&gt;
<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="4.2.0">Jekyll</generator><link href="http://ufo.stealien.com/id/feed.xml" rel="self" type="application/atom+xml" /><link href="http://ufo.stealien.com/id/" rel="alternate" type="text/html" /><updated>2024-03-11T01:06:42-07:00</updated><id>http://ufo.stealien.com/feed.xml</id><title type="html">STEALIEN Technical Blog</title><subtitle>첨단기술을 간편하게 제공하는 기업, 스틸리언이 운영하는 기술블로그입니다.</subtitle><entry xml:lang="ko"><title type="html">Android 1day Exploit Analysis (CVE-2019-2215)</title><link href="http://ufo.stealien.com/id/2024-03-10/Android-1day-Exploit-Analysis-ko" rel="alternate" type="text/html" title="Android 1day Exploit Analysis (CVE-2019-2215)" /><published>2024-03-10T08:00:00-07:00</published><updated>2024-03-10T08:00:00-07:00</updated><id>http://ufo.stealien.com/2024-03-10/Android-1day-Exploit-Analysis-ko</id><content type="html" xml:base="http://ufo.stealien.com/2024-03-10/Android-1day-Exploit-Analysis-ko">&lt;h1 id=&quot;1-introduction&quot;&gt;1. Introduction&lt;/h1&gt;

&lt;p&gt;평소에 관심이 많았던 Android 커널 exploit을 공부해보고자 이 게시물을 작성한다.&lt;/p&gt;

Expand Down Expand Up @@ -1448,7 +1448,7 @@ static void ep_remove_wait_queue(struct eppoll_entry *pwq)

&lt;p&gt;&lt;br /&gt;&lt;/p&gt;

&lt;h3 id=&quot;521-how-selinux-works&quot;&gt;5.2.1 How SELinux works&lt;/h3&gt;
&lt;h3 id=&quot;541-how-selinux-works&quot;&gt;5.4.1 How SELinux works&lt;/h3&gt;

&lt;p&gt;SELinux는 아래와 같은 순서로 동작한다.&lt;/p&gt;

Expand Down

0 comments on commit 4345abd

Please sign in to comment.