glibc Ghost
Yep. Its a bad one. If an attacker can get your host to do a forward name lookup of their choosing, they may be able to execute arbitrary code. Since libc is linked to (almost) all services in Linux, all services are affected. I expect the first attacks to be against the mail service Exim which will affect all WHM/cPanel users—but that is certainly only the tip of the iceburg. We will see aftershocks from this exploit in unexpected ways for some time to come.
Update your packages ASAP. Here’s a quick reference for the versions you should see on common distributions. glibc 2.19 is not affected.
Reboot after the update, libc stays resident until services restart.
CentOS 5 (RHEL/Scientific Linux 5)
yum install glibc nscd: glibc 2.5-123.el5_11.1 nscd 2.5-123.el5_11.1
CentOS 6 (RHEL/Scientific Linux 6)
yum install glibc nscd: glibc 2.12-1.149.el6_6.5 nscd 2.12-1.149.el6_6.5
CentOS 7 (RHEL/Scientific Linux 7)
yum install glibc nscd: glibc 2.17-55.el7_0.5 nscd 2.17-55.el7_0.5
Debian 6 (squeeze)
apt-get update; apt-get install libc6 libc6 2.11.3-4+deb6u4
Debian 7 (wheezy)
apt-get update; apt-get install libc6 libc6 2.13-38+deb7u7
Debian Testing (jessie)
apt-get update; apt-get install libc6 libc6 2.19-13
Ubuntu 10.04 LTS
apt-get update; apt-get install libc6 libc6 2.11.1-0ubuntu7.20
Ubuntu 12.04 LTS
apt-get update; apt-get install libc6 libc6 2.15-0ubuntu10.10
Ubuntu 14.04 LTS
apt-get update; apt-get install libc6 libc6 2.19-0ubuntu6