This mostly affects public servers/webservers but I suggest everybody update and then reboot...
Description:
Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."
Overall Information - This also has all the reference links to other sources
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0235
Redhat/Cent:
https://access.redhat.com/articles/1332213
https://access.redhat.com/security/cve/CVE-2015-0235
Debian:
https://security-tracker.debian.org/tracker/CVE-2015-0235