How to upgrade to macOS Mojave - Apple Support. How to upgrade to macOS High Sierra - Apple Support. How to upgrade to OS X El Capitan - Apple Support. Before upgrading make a full back up of your Mac. Check that third party apps you use have updates available for the new OS. Apple; Shopping Bag + Search Support. Security Update 2020-006 (High Sierra) Security Update 2020-006 is recommended for all users and improves the.
To get the latest features and maintain the security, stability, compatibility, and performance of your Mac, it's important to keep your software up to date. Apple recommends that you always use the latest macOS that is compatible with your Mac.
Learn how to upgrade to macOS Big Sur, the latest version of macOS.
Check compatibility
If a macOS installer can't be used on your Mac, the installer will let you know. For example, it might say that it's too old to be opened on this version of macOS, or that your Mac doesn't have enough free storage space for the installation.
To confirm compatibility before downloading, check the minimum requirements for macOS Catalina, Mojave, High Sierra, Sierra, El Capitan, or Yosemite. You can also find compatibility information on the product-ID page for MacBook Pro, MacBook Air, MacBook, iMac, Mac mini, or Mac Pro.
Make a backup
Before installing, it's a good idea to back up your Mac. Time Machine makes it simple, and other backup methods are also available. Learn how to back up your Mac.
Download macOS
It takes time to download and install macOS, so make sure that you're plugged into AC power and have a reliable internet connection.
Safari uses these links to find the old installers in the App Store. After downloading from the App Store, the installer opens automatically.
- macOS Catalina 10.15 can upgrade Mojave, High Sierra, Sierra, El Capitan, Yosemite, Mavericks
- macOS Mojave 10.14 can upgrade High Sierra, Sierra, El Capitan, Yosemite, Mavericks, Mountain Lion
- macOS High Sierra 10.13 can upgrade Sierra, El Capitan, Yosemite, Mavericks, Mountain Lion
Safari downloads the following older installers as a disk image named InstallOS.dmg or InstallMacOSX.dmg. Open the disk image, then open the .pkg installer inside the disk image. It installs an app named Install [Version Name]. Open that app from your Applications folder to begin installing the operating system.
- macOS Sierra 10.12 can upgrade El Capitan, Yosemite, Mavericks, Mountain Lion, or Lion
- OS X El Capitan 10.11 can upgrade Yosemite, Mavericks, Mountain Lion, Lion, or Snow Leopard
- OS X Yosemite 10.10can upgrade Mavericks, Mountain Lion, Lion, or Snow Leopard
Install macOS
Follow the onscreen instructions in the installer. It might be easiest to begin installation in the evening so that it can complete overnight, if needed.
If the installer asks for permission to install a helper tool, enter the administrator name and password that you use to log in to your Mac, then click Add Helper.
Please allow installation to complete without putting your Mac to sleep or closing its lid. Your Mac might restart, show a progress bar, or show a blank screen several times as it installs macOS and related firmware updates. Coolorus 1 3 1 – color wheel color picker.
Learn more
You might also be able to use macOS Recovery to reinstall the macOS you're using now, upgrade to the latest compatible macOS, or install the macOS that came with your Mac.
About Apple security updates
For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple security updates page.
For more information about security, see the Apple Product Security page. You can encrypt communications with Apple using the Apple Product Security PGP Key.
Apple security documents reference vulnerabilities by CVE-ID when possible.
macOS Sierra 10.12.1, Security Update 2016-002 El Capitan, and Security Update 2016-006 Yosemite
Released October 24, 2016
AppleGraphicsControl
Available for: OS X Yosemite v10.10.5 and OS X El Capitan v10.11.6
Impact: An application may be able to execute arbitrary code with kernel privileges
Description: A memory corruption issue was addressed through improved lock state checking.
CVE-2016-4662: Apple
AppleMobileFileIntegrity
Available for: macOS Sierra 10.12
Impact: A signed executable may substitute code with the same team ID
Description: A validation issue existed in the handling of code signatures. This issue was addressed through additional validation.
CVE-2016-7584: Mark Mentovai and Boris Vidolov of Google Inc.
Entry added November 27, 2016
AppleSMC
Available for: macOS Sierra 10.12
Impact: A local user may be able to elevate privileges
Description: A null pointer dereference was addressed through improved locking.
CVE-2016-4678: daybreaker@Minionz working with Trend Micro's Zero Day Initiative
ATS
Available for: macOS Sierra 10.12
Impact: Processing a maliciously crafted font file may lead to arbitrary code execution
Description: A memory corruption issue was addressed through improved memory handling.
CVE-2016-4667: Simon Huang of alipay, Thelongestusernameofall@gmail.com, Moony Li of TrendMicro, @Flyic
Entry updated October 27, 2016
ATS
Available for: macOS Sierra 10.12
Impact: A local user may be able to execute arbitrary code with additional privileges
Description: A memory corruption issue was addressed through improved memory handling.
CVE-2016-4674: Shrek_wzw of Qihoo 360 Nirvan Team
CFNetwork Proxies
Available for: macOS Sierra 10.12
Impact: An attacker in a privileged network position may be able to leak sensitive user information
Description: A phishing issue existed in the handling of proxy credentials. This issue was addressed by removing unsolicited proxy password authentication prompts.
CVE-2016-7579: Jerry Decime
Core Image Play pai gow online.
Available for: OS X El Capitan v10.11.6
Impact: Viewing a maliciously crafted JPEG file may lead to arbitrary code execution
Description: A memory corruption issue was addressed through improved input validation.
CVE-2016-4681: Ke Liu of Tencent's Xuanwu Lab
Entry added October 25, 2016
CoreGraphics
Available for: macOS Sierra 10.12
Impact: Viewing a maliciously crafted JPEG file may lead to arbitrary code execution
Description: A memory corruption issue was addressed through improved memory handling.
CVE-2016-4673: Marco Grassi (@marcograss) of KeenLab (@keen_lab), Tencent
FaceTime
Available for: macOS Sierra 10.12
Impact: An attacker in a privileged network position may be able to cause a relayed call to continue transmitting audio while appearing as if the call terminated
Description: User interface inconsistencies existed in the handling of relayed calls. These issues were addressed through improved protocol logic.
CVE-2016-7577: Martin Vigo (@martin_vigo) of salesforce.com
Entry added October 27, 2016
FontParser
Available for: macOS Sierra 10.12
Impact: Parsing a maliciously crafted font may disclose sensitive user information
Description: An out-of-bounds read was addressed through improved bounds checking.
CVE-2016-4660: Ke Liu of Tencent's Xuanwu Lab
FontParser
Available for: macOS Sierra 10.12
Impact: Processing a maliciously crafted font file may lead to arbitrary code execution
Description: A buffer overflow existed in the handling of font files. This issue was addressed through improved bounds checking.
CVE-2016-4688: Simon Huang of Alipay company, thelongestusernameofall@gmail.com
Entry added November 27, 2016
IDS - Connectivity
Available for: macOS Sierra 10.12
Impact: An attacker in a privileged network position may be able to trick a user on a multi-party call into believing they are talking to the other party
Description: An impersonation issue existed in the handling of call switching. This issue was addressed through improved handling of 'switch caller' notifications.
CVE-2016-4721: Martin Vigo (@martin_vigo) of salesforce.com
Entry added October 27, 2016
ImageIO
Available for: OS X El Capitan v10.11.6
Impact: Parsing a maliciously crafted PDF may lead to arbitrary code execution
Description: An out-of-bounds write was addressed through improved bounds checking.
CVE-2016-4671: Ke Liu of Tencent's Xuanwu Lab, Juwei Lin (@fuzzerDOTcn)
ImageIO New macbook operating system 2018.
Available for: OS X Yosemite v10.10.5 and OS X El Capitan v10.11.6
Impact: Processing a maliciously crafted image may result in the disclosure of process memory
Description: An out-of-bounds read issue existed in the SGI image parsing. This issue was addressed through improved bounds checking.
CVE-2016-4682: Ke Liu of Tencent's Xuanwu Lab
ImageIO
Available for: OS X El Capitan v10.11.6
Impact: A remote attacker may be able to execute arbitrary code
Description: Multiple out-of-bounds read and write issues exited in SGI parsing. These issues was addressed through improved input validation.
CVE-2016-4683: Ke Liu of Tencent's Xuanwu Lab
Entry added October 25, 2016
Kernel
Available for: OS X Yosemite 10.10.5, OS X El Capitan 10.11.6, and macOS Sierra 10.12
Impact: A local user may be able to cause an unexpected system termination or arbitrary code execution in the kernel
Description: Multiple input validation issues existed in MIG generated code. These issues were addressed through improved validation.
ImageIO New macbook operating system 2018.
Available for: OS X Yosemite v10.10.5 and OS X El Capitan v10.11.6
Impact: Processing a maliciously crafted image may result in the disclosure of process memory
Description: An out-of-bounds read issue existed in the SGI image parsing. This issue was addressed through improved bounds checking.
CVE-2016-4682: Ke Liu of Tencent's Xuanwu Lab
ImageIO
Available for: OS X El Capitan v10.11.6
Impact: A remote attacker may be able to execute arbitrary code
Description: Multiple out-of-bounds read and write issues exited in SGI parsing. These issues was addressed through improved input validation.
CVE-2016-4683: Ke Liu of Tencent's Xuanwu Lab
Entry added October 25, 2016
Kernel
Available for: OS X Yosemite 10.10.5, OS X El Capitan 10.11.6, and macOS Sierra 10.12
Impact: A local user may be able to cause an unexpected system termination or arbitrary code execution in the kernel
Description: Multiple input validation issues existed in MIG generated code. These issues were addressed through improved validation.
CVE-2016-4669: Ian Beer of Google Project Zero
Entry updated November 2, 2016
Kernel
Available for: macOS Sierra 10.12
Impact: A local application may be able to execute arbitrary code with root privileges
Description: Multiple object lifetime issues existed when spawning new processes. These were addressed through improved validation.
CVE-2016-7613: Ian Beer of Google Project Zero
Entry added November 1, 2016
libarchive
Available for: macOS Sierra 10.12
Impact: A malicious archive may be able to overwrite arbitrary files
Description: An issue existed within the path validation logic for symlinks. This issue was addressed through improved path sanitization.
CVE-2016-4679: Omer Medan of enSilo Ltd
libxpc
Available for: macOS Sierra 10.12
Impact: An application may be able to execute arbitrary code with root privileges
Description: A logic issue was addressed through additional restrictions.
CVE-2016-4675: Ian Beer of Google Project Zero
Entry updated March 30, 2017
ntfs
Available for: macOS Sierra 10.12
Impact: An application may be able to cause a denial of service
Description: An issue existed in the parsing of disk images. This issue was addressed through improved validation.
CVE-2016-4661: Recurity Labs on behalf of BSI (German Federal Office for Information Security)
NVIDIA Graphics Drivers
Available for: OS X Yosemite v10.10.5 and OS X El Capitan v10.11.6
Impact: An application may be able to cause a denial of service
Description: A memory corruption issue was addressed through improved input validation.
CVE-2016-4663: Apple
Security
Available for: macOS Sierra 10.12
Impact: A local attacker can observe the length of a login password when a user logs in
Description: A logging issue existed in the handling of passwords. This issue was addressed by removing password length logging.
CVE-2016-4670: Daniel Jalkut of Red Sweater Software
Entry updated October 25, 2016
Thunderbolt
Apple High Sierra Download
Available for: macOS Sierra 10.12
Download Apple Sierra
Impact: An application may be able to execute arbitrary code with kernel privileges
Description: A null pointer dereference was addressed through improved input validation.
Apple Sierra Update
CVE-2016-4780: sweetchip of Grayhash
Entry added November 29, 2016
High Sierra Apple
macOS Sierra 10.12.1 includes the security content of Safari 10.0.1.