On January 26, 2021, a vulnerability in all versions of the sudo software was announced by Qualys.
The Qualys Research Team has discovered a heap overflow vulnerability in sudo, a near-ubiquitous utility available on major Unix-like operating systems. An unprivileged user can gain root privileges on a vulnerable host using a default sudo configuration by exploiting this vulnerability.
Updates have been released for this package to address the issue.
For RPM based systems, you can run this command with the root user to update the RPM:
yum update sudo -y
Please note that this update does not apply to CentOS 6, as CentOS no longer supports version 6. More information on this is available here: CentOS 6 - End of Life Notice
apt update && apt upgrade sudo