A flaw was found in the way sudo parsed tty information from the process
status file in the proc filesystem. A local user with privileges to execute
commands via sudo could use this flaw to escalate their privileges to root.
Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.
Please refer to Amazon advisory ALAS-2017-843 for affected packages and patching details, or update with your package manager.
Following are links for downloading patches to fix the vulnerabilities: