Security Issue: GHOST Vulnerability (CVE-2015-0235)

A critically severe vulnerability affecting Linux GNU C Library (glibc) was announced and is known as GHOST (CVE-2015-0235).

We highly recommend that you update glibc on your server and schedule a full system reboot to be completely safe from any exploit related to this
vulnerability.

Instructions to update,

For Ubuntu/Debian, you can run: apt-get update && sudo apt-get install –only-upgrade libc6 -y
For Centos/RHEL, you can run: yum update glibc

You can read more about this announcement here, http://www.openwall.com/lists/oss-security/2015/01/27/9

dont panic, just test your system for example with this tool:
https://itservices.uchicago.edu/page/ghost-vulnerability

Easier test,

python -c "from ctypes import CDLL; CDLL('libc.so.6').gethostbyname('0' * 0x10000)"

If this results in segmentation fault, system is unpatched
ref: http://www.the-s-unit.nl/ghost-py-checker