Multiple new macOS sandbox escape vulnerabilities
macOS sandbox and XPC design issues
- Many commenters focus on how many XPC services meant to be “app-private” are reachable from sandboxed apps, calling this a structural design problem.
- Apple’s apparent strategy of patching individual XPC services is seen as “band‑aid” rather than a systemic fix; people expect more XPC-related CVEs to keep appearing.
- Some call for capability-based “Darwin containers” instead of the current, largely blacklist‑like sandbox model.
Legacy, Mach, and architectural constraints
- There is debate over whether the Mach/XNU heritage is to blame; some argue Mach isn’t directly relevant to these bugs, others say decades of workarounds and legacy design inevitably shape today’s problems.
- Several note that macOS/NeXTSTEP were originally built for openness and extensibility; Apple has since been layering security on top of that, with mixed results.
Comparisons with other OS security models
- Windows: backward compatibility and process injection (hooks, DLLs) are highlighted as a different but also problematic security story.
- Linux: SELinux is cited as an example of retrofitted fine-grained controls; some say it “managed it,” others argue it’s hard to use, often disabled, and mainly focused on servers.
- Android and ChromeOS are repeatedly praised for stricter sandboxing, SELinux use, verified boot, and app isolation, in contrast to typical desktop OS behavior.
- Qubes OS is held up as a strong, capability-like model using hardware virtualization, but acknowledged as demanding for average users and constrained for GPU-heavy workloads.
Security vs usability and backwards compatibility
- Several argue that deep security is fundamentally at odds with backwards compatibility and some power-user workflows; a ground‑up redesign or strong compartmentalization is seen as ultimately necessary.
- Others stress that “ordinary users” already live mostly in browsers and could be well‑served by tablet/phone‑style locked‑down environments.
Disclosure, bounties, and “security theater”
- Experiences with Apple’s vulnerability reporting are mixed: slow patching, poor communication, and inconsistent bounties are recurring complaints.
- Some describe macOS as drifting toward “security theater”: many permission dialogs and restrictions that burden legitimate developers while not reliably stopping sophisticated attackers.
- There is debate over responsible disclosure timelines, with one strong view that immediate public disclosure would pressure vendors but shift more risk to users.