Comment Re:Immutability and W^X don't prevent this (Score 1) 153
You could bypass SELinux with this.
When your attack modifies the cached copy of an executable, you do it for *everyone*. So even if the process you control cannot make the system calls you want and maybe you can't exec the victim binary yourself, you *can* make it so the next time someone runs 'ls', it opens a backdoor for you in whatever context that command runs.
This is an impossibly bad breakage of the security model that cuts through pretty much every isolation mechanism in a system.
While immutable distros are broadly better structured to tolerate a weakness here or there, in this specific case it does not afford protection.
You should never assume immutable distro means you don't have a problem when a vulnerability comes out, particularly in the kernel which is the very thing implementing the security primitives in the first place.