From 440424f52483bb3b597e65817f358aad64a6100b Mon Sep 17 00:00:00 2001 From: "github-actions[bot]" <41898282+github-actions[bot]@users.noreply.github.com> Date: Mon, 20 Apr 2026 16:05:45 +0000 Subject: [PATCH] doc: readme: correct markdown indentation for unordered list items (#569) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit built from commit 8a417e55799dc220041f3a919bb1ea40719789bd dated 2026-04-21 00:02:47 +0800 by 林博仁 Buo-ren Lin (Buo.Ren.Lin@gmail.com) Signed-off-by: 林博仁(Buo-ren Lin) --- README.md | 22 +++++++++++----------- spectre-meltdown-checker.sh | 2 +- 2 files changed, 12 insertions(+), 12 deletions(-) diff --git a/README.md b/README.md index 3f50fe9..e5d61bb 100644 --- a/README.md +++ b/README.md @@ -272,23 +272,23 @@ In **Hardware-only** mode, the script only reports CPU information and per-CVE h - Get the latest version of the script using `curl` *or* `wget` -```bash -curl -L https://meltdown.ovh -o spectre-meltdown-checker.sh -wget https://meltdown.ovh -O spectre-meltdown-checker.sh -``` + ```bash + curl -L https://meltdown.ovh -o spectre-meltdown-checker.sh + wget https://meltdown.ovh -O spectre-meltdown-checker.sh + ``` - Inspect the script. You never blindly run scripts you downloaded from the Internet, do you? -```bash -vim spectre-meltdown-checker.sh -``` + ```bash + vim spectre-meltdown-checker.sh + ``` - When you're ready, run the script as root -```bash -chmod +x spectre-meltdown-checker.sh -sudo ./spectre-meltdown-checker.sh -``` + ```bash + chmod +x spectre-meltdown-checker.sh + sudo ./spectre-meltdown-checker.sh + ``` ### Using a docker container diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-checker.sh index 754a6b2..d95f9b0 100755 --- a/spectre-meltdown-checker.sh +++ b/spectre-meltdown-checker.sh @@ -13,7 +13,7 @@ # # Stephane Lesimple # -VERSION='26.33.0420658' +VERSION='26.33.0420669' # --- Common paths and basedirs --- readonly VULN_SYSFS_BASE="/sys/devices/system/cpu/vulnerabilities"