diff options
author | Jesús Eduardo <heckyel@hyperbola.info> | 2018-02-11 15:31:47 -0500 |
---|---|---|
committer | Jesús Eduardo <heckyel@hyperbola.info> | 2018-02-11 15:31:47 -0500 |
commit | e597df97eb373cd4a398e17a0b043ae43b4713be (patch) | |
tree | c1bc65a0c1d8cd139cd5ef0d4eb4ae6b5b598eb1 | |
parent | caba03a8ab10b43ec4c2c3028d04fb227dbe2f7a (diff) | |
download | spectre-meltdown-checker-e597df97eb373cd4a398e17a0b043ae43b4713be.tar.lz spectre-meltdown-checker-e597df97eb373cd4a398e17a0b043ae43b4713be.tar.xz spectre-meltdown-checker-e597df97eb373cd4a398e17a0b043ae43b4713be.zip |
fix name OS -> GNU/Linux
-rw-r--r-- | README.md | 4 |
1 files changed, 2 insertions, 2 deletions
@@ -1,9 +1,9 @@ Spectre & Meltdown Checker ========================== -A simple shell script to tell if your Linux installation is vulnerable against the 3 "speculative execution" CVEs that were made public early 2018. +A simple shell script to tell if your GNU/Linux installation is vulnerable against the 3 "speculative execution" CVEs that were made public early 2018. -Without options, it'll inspect your currently running kernel. +Without options, it'll inspect your currently running kernel. You can also specify a kernel image on the command line, if you'd like to inspect a kernel you're not running. The script will do its best to detect mitigations, including backported non-vanilla patches, regardless of the advertised kernel version number. |