A potential security vulnerability was found in the glibc library, which has been assigned CVE-2015-0235 and is commonly referred to as ‘GHOST’. All versions of glibc shipped with all variants of Red Hat Enterprise Linux are affected.
You can read more about the foundation of this vulnerablilty at https://access.redhat.com/articles/1332213
To eliminate the possibility of an exploit:
1. Update the glibc and nscd packages on your system using the packages released by the OS vendors.
On CentOS servers you can apply the patch using yum :
yum -y update glibc nscd
2. Reboot the server to make sure all the affected services are restarted .
For cPanel servers the cPanel takes care of the OS upgrades which applies the upgrades automatically however a reboot is required to restart all the services.
Lastly as always support is avaialble 24×7 to assist you incase you need the patch applied or to check if your server is vulnerable or any other assistance.