Skip to content

Tech Note 28th January 2021


Matillion has become aware of a sudo package vulnerability and we are advising that users follow the below instructions to navigate this vulnerability.

This tech note applies to all Matillion ETL platforms.

Advised Workaround

As a workaround, please run the following commands:

Please Note

Users will need to run these commands as root.

1. First, remove the cache of repositories that are enabled:

yum clean all

2. Next, check that a sudo package update is available. The available version must be 1.8.23 or higher for the workaround to be successful:

yum list updates | grep sudo

3. Next, update sudo:

yum update sudo

4. Type y in response to the CLI confirmation question if an appropriate version is prompted.

5. Lastly, validate that the sudo version is equal to or higher than 1.8.23:

sudo --version | tail -n 1


Please do not hesitate to contact support if you have any questions regarding this workaround.