Code in the Kernel is subject to the same bugs that affect all other software. Just because code is running in the kernel doesn't mean it's immune to stack overflows have been made public.
Exploiting a buffer overflow in the kernel is a bit tricky because exceptions in the kernel ten to crash the machine or cause a "blue screen of death." Exploits of the kernel are especially noteworthy because they can directly infect a machine with a rootkit and they bypass all security mechanisms. An attacker does not need administrative privileges or the ability to load a device driver if they can simply overflow the kernel stack. An article on kernel overflows can be found in Phrack Magazine, issue 60, article 6: "Smashing the Kernel Stack for Fun and Profit". by Sinan "noir" Eren.
That was an excerpt from: "Exploiting Software, How to Break Code"
Exploiting a buffer overflow in the kernel is a bit tricky because exceptions in the kernel ten to crash the machine or cause a "blue screen of death." Exploits of the kernel are especially noteworthy because they can directly infect a machine with a rootkit and they bypass all security mechanisms. An attacker does not need administrative privileges or the ability to load a device driver if they can simply overflow the kernel stack. An article on kernel overflows can be found in Phrack Magazine, issue 60, article 6: "Smashing the Kernel Stack for Fun and Profit". by Sinan "noir" Eren.
That was an excerpt from: "Exploiting Software, How to Break Code"