diff --git a/README.md b/README.md index 3f50fe9..e5d61bb 100644 --- a/README.md +++ b/README.md @@ -272,23 +272,23 @@ In **Hardware-only** mode, the script only reports CPU information and per-CVE h - Get the latest version of the script using `curl` *or* `wget` -```bash -curl -L https://meltdown.ovh -o spectre-meltdown-checker.sh -wget https://meltdown.ovh -O spectre-meltdown-checker.sh -``` + ```bash + curl -L https://meltdown.ovh -o spectre-meltdown-checker.sh + wget https://meltdown.ovh -O spectre-meltdown-checker.sh + ``` - Inspect the script. You never blindly run scripts you downloaded from the Internet, do you? -```bash -vim spectre-meltdown-checker.sh -``` + ```bash + vim spectre-meltdown-checker.sh + ``` - When you're ready, run the script as root -```bash -chmod +x spectre-meltdown-checker.sh -sudo ./spectre-meltdown-checker.sh -``` + ```bash + chmod +x spectre-meltdown-checker.sh + sudo ./spectre-meltdown-checker.sh + ``` ### Using a docker container diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-checker.sh index 754a6b2..d95f9b0 100755 --- a/spectre-meltdown-checker.sh +++ b/spectre-meltdown-checker.sh @@ -13,7 +13,7 @@ # # Stephane Lesimple # -VERSION='26.33.0420658' +VERSION='26.33.0420669' # --- Common paths and basedirs --- readonly VULN_SYSFS_BASE="/sys/devices/system/cpu/vulnerabilities"