aboutsummaryrefslogtreecommitdiffstats
path: root/README.md
diff options
context:
space:
mode:
authorGianluca Varisco <gianluca.varisco@gmail.com>2018-01-11 12:01:31 +0100
committerStéphane Lesimple <speed47_github@speed47.net>2018-01-11 12:01:31 +0100
commit56b67f8082d8afcbb7e7cef4e839feea994ada16 (patch)
tree558dbdc5b85d0680279ced61957a679824f6cc30 /README.md
parent52a8f7888565edeaf7e59a1b8e982bcee37a3791 (diff)
downloadspectre-meltdown-checker-56b67f8082d8afcbb7e7cef4e839feea994ada16.tar.lz
spectre-meltdown-checker-56b67f8082d8afcbb7e7cef4e839feea994ada16.tar.xz
spectre-meltdown-checker-56b67f8082d8afcbb7e7cef4e839feea994ada16.zip
Typo in README (#54)
Diffstat (limited to 'README.md')
-rw-r--r--README.md2
1 files changed, 1 insertions, 1 deletions
diff --git a/README.md b/README.md
index 04ca14b..897820f 100644
--- a/README.md
+++ b/README.md
@@ -3,7 +3,7 @@ Spectre & Meltdown Checker
A simple shell script to tell if your Linux installation is vulnerable against the 3 "speculative execution" CVEs that were made public early 2018.
-Without options, it'll inspect you currently running kernel.
+Without options, it'll inspect your currently running kernel.
You can also specify a kernel image on the command line, if you'd like to inspect a kernel you're not running.
The script will do its best to detect mitigations, including backported non-vanilla patches, regardless of the advertised kernel version number.