diff --git a/docs/2024-03-10/Android-1day-Exploit-Analysis-ko.html b/docs/2024-03-10/Android-1day-Exploit-Analysis-ko.html
index 4e4abcc..99046ae 100644
--- a/docs/2024-03-10/Android-1day-Exploit-Analysis-ko.html
+++ b/docs/2024-03-10/Android-1day-Exploit-Analysis-ko.html
@@ -1537,7 +1537,7 @@
5.4 Bypass SELinux
-5.2.1 How SELinux works
+5.4.1 How SELinux works
SELinux는 아래와 같은 순서로 동작한다.
diff --git a/docs/feed.xml b/docs/feed.xml
index 1297de9..8100011 100644
--- a/docs/feed.xml
+++ b/docs/feed.xml
@@ -1,4 +1,4 @@
-Jekyll2024-03-11T01:03:33-07:00http://ufo.stealien.com/feed.xmlSTEALIEN Technical Blog첨단기술을 간편하게 제공하는 기업, 스틸리언이 운영하는 기술블로그입니다.Android 1day Exploit Analysis (CVE-2019-2215)2024-03-10T08:00:00-07:002024-03-10T08:00:00-07:00http://ufo.stealien.com/2024-03-10/Android-1day-Exploit-Analysis-ko<h1 id="1-introduction">1. Introduction</h1>
+Jekyll2024-03-11T01:06:42-07:00http://ufo.stealien.com/feed.xmlSTEALIEN Technical Blog첨단기술을 간편하게 제공하는 기업, 스틸리언이 운영하는 기술블로그입니다.Android 1day Exploit Analysis (CVE-2019-2215)2024-03-10T08:00:00-07:002024-03-10T08:00:00-07:00http://ufo.stealien.com/2024-03-10/Android-1day-Exploit-Analysis-ko<h1 id="1-introduction">1. Introduction</h1>
<p>평소에 관심이 많았던 Android 커널 exploit을 공부해보고자 이 게시물을 작성한다.</p>
@@ -1448,7 +1448,7 @@ static void ep_remove_wait_queue(struct eppoll_entry *pwq)
<p><br /></p>
-<h3 id="521-how-selinux-works">5.2.1 How SELinux works</h3>
+<h3 id="541-how-selinux-works">5.4.1 How SELinux works</h3>
<p>SELinux는 아래와 같은 순서로 동작한다.</p>
diff --git a/docs/id/2024-03-10/Android-1day-Exploit-Analysis-ko.html b/docs/id/2024-03-10/Android-1day-Exploit-Analysis-ko.html
index 2bd774e..4e57287 100644
--- a/docs/id/2024-03-10/Android-1day-Exploit-Analysis-ko.html
+++ b/docs/id/2024-03-10/Android-1day-Exploit-Analysis-ko.html
@@ -1537,7 +1537,7 @@ 5.4 Bypass SELinux
-5.2.1 How SELinux works
+5.4.1 How SELinux works
SELinux는 아래와 같은 순서로 동작한다.
diff --git a/docs/id/feed.xml b/docs/id/feed.xml
index 2bcdffa..33ff11b 100644
--- a/docs/id/feed.xml
+++ b/docs/id/feed.xml
@@ -1,4 +1,4 @@
-Jekyll2024-03-11T01:03:33-07:00http://ufo.stealien.com/feed.xmlSTEALIEN Technical Blog첨단기술을 간편하게 제공하는 기업, 스틸리언이 운영하는 기술블로그입니다.Android 1day Exploit Analysis (CVE-2019-2215)2024-03-10T08:00:00-07:002024-03-10T08:00:00-07:00http://ufo.stealien.com/2024-03-10/Android-1day-Exploit-Analysis-ko<h1 id="1-introduction">1. Introduction</h1>
+Jekyll2024-03-11T01:06:42-07:00http://ufo.stealien.com/feed.xmlSTEALIEN Technical Blog첨단기술을 간편하게 제공하는 기업, 스틸리언이 운영하는 기술블로그입니다.Android 1day Exploit Analysis (CVE-2019-2215)2024-03-10T08:00:00-07:002024-03-10T08:00:00-07:00http://ufo.stealien.com/2024-03-10/Android-1day-Exploit-Analysis-ko<h1 id="1-introduction">1. Introduction</h1>
<p>평소에 관심이 많았던 Android 커널 exploit을 공부해보고자 이 게시물을 작성한다.</p>
@@ -1448,7 +1448,7 @@ static void ep_remove_wait_queue(struct eppoll_entry *pwq)
<p><br /></p>
-<h3 id="521-how-selinux-works">5.2.1 How SELinux works</h3>
+<h3 id="541-how-selinux-works">5.4.1 How SELinux works</h3>
<p>SELinux는 아래와 같은 순서로 동작한다.</p>