'GHOST' Vulnerability - glibc CVE-2015-0235

This mostly affects public servers/webservers but I suggest everybody update and then reboot...

 

Description:

Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."

 

Overall Information -  This also has all the reference links to other sources

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0235

 

Redhat/Cent:

https://access.redhat.com/articles/1332213

https://access.redhat.com/security/cve/CVE-2015-0235

Debian:

https://security-tracker.debian.org/tracker/CVE-2015-0235