diff options
author | Gianluca Varisco <gianluca.varisco@gmail.com> | 2018-01-11 12:01:31 +0100 |
---|---|---|
committer | Stéphane Lesimple <speed47_github@speed47.net> | 2018-01-11 12:01:31 +0100 |
commit | 56b67f8082d8afcbb7e7cef4e839feea994ada16 (patch) | |
tree | 558dbdc5b85d0680279ced61957a679824f6cc30 /README.md | |
parent | 52a8f7888565edeaf7e59a1b8e982bcee37a3791 (diff) | |
download | spectre-meltdown-checker-56b67f8082d8afcbb7e7cef4e839feea994ada16.tar.lz spectre-meltdown-checker-56b67f8082d8afcbb7e7cef4e839feea994ada16.tar.xz spectre-meltdown-checker-56b67f8082d8afcbb7e7cef4e839feea994ada16.zip |
Typo in README (#54)
Diffstat (limited to 'README.md')
-rw-r--r-- | README.md | 2 |
1 files changed, 1 insertions, 1 deletions
@@ -3,7 +3,7 @@ Spectre & Meltdown Checker A simple shell script to tell if your Linux installation is vulnerable against the 3 "speculative execution" CVEs that were made public early 2018. -Without options, it'll inspect you currently running kernel. +Without options, it'll inspect your currently running kernel. You can also specify a kernel image on the command line, if you'd like to inspect a kernel you're not running. The script will do its best to detect mitigations, including backported non-vanilla patches, regardless of the advertised kernel version number. |