Today a new exploit has been discovered that affects the BASH shell–the most prevalent shell used in the world–and can result in remote exploitation of servers that can include full takeover. It has been estimated to be more severe in nature and more exploitable than Heartbleed.
Here’s a stackexchange post about Shellshock. You’ll be able to find tons of information regarding this anywhere on the internet.
At any rate, no matter what distribution you are using, you are susceptible to it if BASH is your default shell, which is the case of the vast, vast majority of Linux installs.
In the above link you can see more details, including this vulnerability test suite:
root@mineos:~# curl https://shellshocker.net/shellshock_test.sh | bash
CVE-2014-6271 (original shellshock): not vulnerable
CVE-2014-6277 (segfault): not vulnerable
CVE-2014-6278 (Florian's patch): not vulnerable
CVE-2014-7169 (taviso bug): not vulnerable
CVE-2014-7186 (redir_stack bug): not vulnerable
CVE-2014-7187 (nested loops off by one): not vulnerable
CVE-2014-//// (exploit 3 on http://shellshocker.net/): not vulnerable
On aptitude-based distros, e.g., Debian, Ubuntu, Turnkey, etc., you can update your packages with the following commands:
root@core ~# apt-get update
root@core ~# apt-get upgrade
Depending on your host system, follow the prescribed instructions to update your bash shell. While BSD users are unlikely to be affected by this (Bash is not installed by default), in all cases it is worth testing your system for this vulnerability.
According to additional sources, there is still some uncertainty about the comprehensiveness of this fix: it is safe and advisable to upgrade bash immediately, but the question still stands on whether there are other means of exploiting this parsing design-flaw, so there may be continued updates coming soon over the next few days, too.