The rose_parse_ccitt function in net/rose/rose_subr.c in the Linux kernel before 2.6.39 does not validate the FAC_CCITT_DEST_NSAP and FAC_CCITT_SRC_NSAP fields, which allows remote attackers to (1) cause a denial of service (integer underflow, heap memory corruption, and panic) via a small length value in data sent to a ROSE socket, or (2) conduct stack-based buffer overflow attacks via a large length value in data sent to a ROSE socket.
https://bugzilla.redhat.com/show_bug.cgi?id=770777
http://www.openwall.com/lists/oss-security/2011/12/28/2
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html