Integer overflow in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the size argument to the __hcreate_r function, which triggers out-of-bounds heap-memory access. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8778
configure --with-tempalte=feature/build_libc make -C build eglibc-sourcery-compile.patch cd /glibc-src-of-eglibc-sourcery-compile/ patch -p2 < /path-to-attached-patch