Integer overflow in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the size argument to the __hcreate_r function, which triggers out-of-bounds heap-memory access. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8778
echo 'USE_SDK_GLIBC = "0"' >> local.conf cd layers/oe-core patch -Np1 < 0001-glibc-Fix-CVE-2015-8778.patch