Tech Note 28th January 2021
Matillion has become aware of a sudo package vulnerability and we are advising that users follow the below instructions to navigate this vulnerability.
This tech note applies to all Matillion ETL platforms.
As a workaround, please run the following commands:
Users will need to run these commands as root.
1. First, remove the cache of repositories that are enabled:
yum clean all
2. Next, check that a sudo package update is available. The available version must be 1.8.23 or higher for the workaround to be successful:
yum list updates | grep sudo
3. Next, update sudo:
yum update sudo
y in response to the CLI confirmation question if an appropriate version is prompted.
5. Lastly, validate that the sudo version is equal to or higher than 1.8.23:
sudo --version | tail -n 1
Please do not hesitate to contact support if you have any questions regarding this workaround.