Integer overflow in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the size argument to the __hcreate_r function, which triggers out-of-bounds heap-memory access. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8778
Apply the attached patch to layers/oe-core