This looks pretty brutal.<p>Quote from Kurt Seifried of RedHat <a href="http://www.openwall.com/lists/oss-security/2017/06/19/2" rel="nofollow">http://www.openwall.com/lists/oss-security/2017/06/19/2</a><p>"<i>I just want to publicly thank Qualys for working with the Open Source community so we (Linux and BSD) could all get this fixed properly. There was a lot of work from everyone involved and it all went pretty smoothly.</i>"<p>Debian security advisories rapid fire:<p>glibc <a href="https://lists.debian.org/debian-security-announce/2017/msg00146.html" rel="nofollow">https://lists.debian.org/debian-security-announce/2017/msg00...</a><p>linux <a href="https://lists.debian.org/debian-security-announce/2017/msg00148.html" rel="nofollow">https://lists.debian.org/debian-security-announce/2017/msg00...</a><p>exim4 <a href="https://lists.debian.org/debian-security-announce/2017/msg00147.html" rel="nofollow">https://lists.debian.org/debian-security-announce/2017/msg00...</a><p>libffi <a href="https://lists.debian.org/debian-security-announce/2017/msg00149.html" rel="nofollow">https://lists.debian.org/debian-security-announce/2017/msg00...</a><p>And just a sample from the Qualys announcement (out of many more), "local-root exploit against Exim", "local-root exploit against Sudo (Debian, Ubuntu, CentOS)", "local-root exploit against /bin/su", "local-root exploit against ld.so and most SUID-root binaries (Debian, Ubuntu, Fedora, CentOS)", "local-root exploit against /usr/bin/rsh (Solaris 11)", as well as proof of concepts for OpenBSD, FreeBSD and so on.