This is big research. Stack overflows (exaustion) _are_ exploitable in user space.
Qualys Security Advisory: Stack Clash. 24 CVE, 7 PoCs, 7 LPE exploits; Linux/{Net,Free,Open}BSD/Solaris; i386/amd64: openwall.com/lists/oss-secur…
3
13
18
turns out it has been around for over a decade
An Ancient Kernel Hole is (Not) Closed: grsecurity.net/an_ancient_ke…. A lesson in real non-embargoed security.
1
1
2
Yup, what's funny is that we tested vfprintf to jump over the guard page on a grsecurity kernel. :) (even though the post says not affected)
1
Replying to @marver @joernchen
what guard page? you mean the heap-stack gap?

Jun 19, 2017 · 6:02 PM UTC

1
Replying to @paxteam @joernchen
What we tested is jumping the guard page between two thread stacks in userland. But you probably meant grsec is not affected in kernelland?
2
Which by itself is boring of course. More interesting is common functions in glibc such as vfprintf or realpath have huge stack buffers..