From 3c9acb2f1e3745dd6c46b27a19ba62aba4cd6d8d Mon Sep 17 00:00:00 2001 From: Enzo Davico Date: Fri, 6 Oct 2023 15:36:51 -0300 Subject: [PATCH] Update link in A06_2021-Vulnerable_and_Outdated_Components.md --- 2021/docs/A06_2021-Vulnerable_and_Outdated_Components.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/2021/docs/A06_2021-Vulnerable_and_Outdated_Components.md b/2021/docs/A06_2021-Vulnerable_and_Outdated_Components.md index 361420885..7a966cee6 100644 --- a/2021/docs/A06_2021-Vulnerable_and_Outdated_Components.md +++ b/2021/docs/A06_2021-Vulnerable_and_Outdated_Components.md @@ -62,8 +62,8 @@ There should be a patch management process in place to: - Only obtain components from official sources over secure links. Prefer signed packages to reduce the chance of including a modified, - malicious component (See A08:2021-Software and Data Integrity - Failures). + malicious component (see [A08:2021-Software and Data Integrity + Failures](A08_2021-Software_and_Data_Integrity_Failures.md)). - Monitor for libraries and components that are unmaintained or do not create security patches for older versions. If patching is not