Dec 08, 2015 Following an extensive testing, Apple on Tuesday released OS X 10.11.2 (build number 15C50), the second major update to El Capitan, for public consumption. In addition to improving the stability, compatibility and security of your Mac, OS X 10.11.2 improves iCloud Photo Sharing for Live Photos, as well as the reliability of Wi-Fi networking, Handoff and AirDrop.
OS X 10.11.2 Features According to Apple's release note, the all new OS X 10.11.2 Update includes; improvements for stability, compatibility, security, fixes for bugs, iCloud Photos, Wi-Fi networking, Handoff, AirDrop, Bluetooth devices, Mail app, importing photos using a USB cable etc.
Editor’s note: We've updated this guide for the release version of El Capitan (OS X 10.11), which was released on September 30, 2015. When OS X shipped on a DVD a good number of years ago, you.
The new OS from Mac is here in OS X El Capitan. Apple's 12th OS release is the OS X El Capitan. Named after a rock formation in the Yosemite National Park, USA, OS X El Capitan continues and focuses on stability, performance and security in which OS X Yosemite started.
OS X El Capitan (version 10.11) is the twelfth major release of OS X, Apple Inc.’s desktop and server operating system for Macintosh computers. It is the successor to OS X Yosemite and focuses mainly on performance, stability and security. Jan 09, 2018 Mac OS X El Capitan 10.11 is the twelfth major release of Mac OS X now known as macOS. Mac OS X El Capitan 10.11 Review macOS X El Captain is the successor of OS X Yosemite providing numerous powerful features enhancements and better performance than the previous releases.
Contents
2. El Capitan Features
3. El Capitan Download & Install
4. OS X 10.11 Problems
5. Mac OS X 10.11 Tips
6. Software for OS X 10.11
7. Compare OS
Mac OS X El Capitan can be downloaded directly from the Apple website. The Beta version of the OS is available but the final version will be made available towards the Autumn season of 2015 as speculated by many Apple users. You can use your older Mac OS with the new El Capitan, all you have to do is to create a different partition for the new El Capitan if you have the Yosemite already installed. There are few steps you should consider in downloading the latest El Capitan and these are as follow.
Part 1. Preparing Mac Device for the Installation of Mac OS X El Capitan
Both Mavericks and Yosemite are easier to download and install on Mac devices, however, this is not the case with Mac OS X El Capitan. Just before you install the new Mac OS X El Capitan, you must perform few tasks to ensure that your Mac will be ready for the installation of the software:
Check Your Mac - Check whether your Mac will be able to run the new OS X 10.11. Apple has provided a list of the Mac supported by the new Mac OS X El Capitan and if you are already running the Mavericks or Yosemite, the same lists may also apply to the El Capitan. You can also check this list on the “Will your Mac run Mac OS X” article on Apple website.
Create Enough Space - Check that your Mac has sufficient RAM to run the software. You wouldn’t run into any hitches if your Mac device is listed on the acceptable Mac devices for Mac OS X El Capitan. Apple recommend that you have a minimum RAM of 2G, however, a minimum of 4G space of RAM is highly recommended. You will also need to delete some unnecessary files to create more space for the installation of El Capitan.
Check Hard Drive Space - Make sure you have sufficient hard drive space for the installation of Mac OS X El Capitan. Yosemite will normally require a Hard drive space of up to 5GB , but the new El Capitan will require between 15g and 20gb of space on your hard drive for successful download and installation.
Register - Register to access the Mac Apple store. You need to upgrade your Mac and get access to Mac Apple store for a small fee in order to get the most out of your Mac OS X El Capitan.
Updates - Make sure your third party Apps are updated before installing Mac OS X El Capitan. You can simply launch App store and click on “Updates” on the tool bar if you want to update the apps you bought from Apple store. For other third party apps, you may need some manual updates from manufacturer websites to complete such updates.
Backup Your Mac - Perform a backup before downloading and installing Mac OS X El Capitan- you need to protect your important documents and files, thus you may have to back them up somewhere before starting the download and installation process.
Part 2. Installing Mac OS X El Capitan Safely on Your Mac Device
Mac Os X El Capitan 10.11.3
You can install or upgrade to Mac OS X El Capitan as a dual boot partition. You may be able to download a test version if you register for the OS X Seed program from Apple, and you can also provide a feedback to Apple in order for the company to update the software before it is finally released. You can follow these instructions to install the Beta version of Mac OS X El Capitan. It is strictly recommended that you perform a backup before you begin this process. It is important you keep in mind that Mac OS X El Capitan is still in a Beta format, thus , not all your apps or programs will work on it.
Visit the Apple Beta software program page and log unto the page using your Apple ID. Simply click on “Enroll your Mac”.
Click on the download link that shows up, and enter the personal redemption code given to you.
Open the downloaded Mac OS X El Capitan software and preview the file in the Applications folder. Click “Continue” and then select “Agree”.
Click on “Install” and then enter your admin password. You're all set!
Part 3. Installing Mac OS X El Capitan Safely on an External Drive
You don’t have to install Mac OS X El Capitan on your Mac device, you can also install it on an external hard drive, most especially when you want to access the OS quickly. You can consider Thunderbolt drives which are similar to the internal drives on Mac, or you can simply use the USB 3.0 external drive if you don’t have the Thunderbolt on your Mac. You will have to format an external drive before installing Mac OS X El Capitan, this will help to install the Mac OS X El Capitan safely on the hard drive and at the same time the configuration of your device will not be changed.
Step 1. Launch Disk Utility
Connect the external drive to your Mac device and make sure it is detected. Launch the Disk Utility tool ( go to “Utilities” and you will find it there). Choose the drive- it is located at the side bar.
Step 2. Partition
Simply click on “Partition”. Make sure the partition layout reads “1 partition”. Name the partition. You can use a name like “Mac OS X El Capitan”. Click on “Options” and ensure that the Guide partition table is chosen, and then click on “Ok”.
Step 3. Options
Click “Apply'. Open the preview file from your Mac’s application folder. Click on “Continue”. Click on the “Agree” button.
Step 4. Open
Click on “Show all disks”. Simply highlight the “External Hard Drive” on which you have just install the Mac OS X El Capitan
Step 5. Install
Click on “Install”, and enter the admin password.
For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.
For information about the Apple Product Security PGP Key, see How to use the Apple Product Security PGP Key.
Where possible, CVE IDs are used to reference the vulnerabilities for further information.
To learn about other security updates, see Apple security updates.
OS X El Capitan 10.11.2, Security Update 2015-005 Yosemite, and Security Update 2015-008 Mavericks
apache_mod_php
Available for: OS X El Capitan v10.11 and v10.11.1
Impact: Multiple vulnerabilities in PHP
Description: Multiple vulnerabilities existed in PHP versions prior to 5.5.29, the most serious of which may have led to remote code execution. These were addressed by updating PHP to version 5.5.30.
CVE-ID
CVE-2015-7803
CVE-2015-7804
AppSandbox
Available for: OS X El Capitan v10.11 and v10.11.1
Impact: A malicious application may maintain access to Contacts after having access revoked
Description: An issue existed in the sandbox's handling of hard links. This issue was addressed through improved hardening of the app sandbox.
CVE-ID
CVE-2015-7001 : Razvan Deaconescu and Mihai Bucicoiu of University POLITEHNICA of Bucharest; Luke Deshotels and William Enck of North Carolina State University; Lucas Vincenzo Davi and Ahmad-Reza Sadeghi of TU Darmstadt
Bluetooth
Available for: OS X El Capitan v10.11 and v10.11.1
Impact: A local user may be able to execute arbitrary code with system privileges
Description: A memory corruption issue existed in the Bluetooth HCI interface. This issue was addressed through improved memory handling.
CVE-ID
CVE-2015-7108 : Ian Beer of Google Project Zero
CFNetwork HTTPProtocol
Available for: OS X El Capitan v10.11 and v10.11.1
Impact: An attacker with a privileged network position may be able to bypass HSTS
Description: An input validation issue existed within URL processing. This issue was addressed through improved URL validation.
CVE-ID
CVE-2015-7094 : Tsubasa Iinuma (@llamakko_cafe) of Gehirn Inc. and Muneaki Nishimura (nishimunea)
Compression
Available for: OS X El Capitan v10.11 and v10.11.1
Impact: Visiting a maliciously crafted website may lead to arbitrary code execution
Description: An uninitialized memory access issue existed in zlib. This issue was addressed through improved memory initialization and additional validation of zlib streams.
CVE-ID
CVE-2015-7054 : j00ru
Configuration Profiles
Available for: OS X El Capitan v10.11 and v10.11.1
Impact: A local attacker may be able to install a configuration profile without admin privileges
Description: An issue existed when installing configuration profiles. This issue was addressed through improved authorization checks.
CVE-ID
CVE-2015-7062 : David Mulder of Dell Software
CoreGraphics
Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 and v10.11.1
Impact: Processing a maliciously crafted font file may lead to arbitrary code execution
Description: A memory corruption issue existed in the processing of font files. This issue was addressed through improved input validation.
CVE-ID
CVE-2015-7105 : John Villamil (@day6reak), Yahoo Pentest Team
CoreMedia Playback
Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 and v10.11.1
Impact: Visiting a maliciously crafted website may lead to arbitrary code execution
Description: Multiple memory corruption issues existed in the processing of malformed media files. These issues were addressed through improved memory handling.
CVE-ID
CVE-2015-7074 : Apple
CVE-2015-7075
Disk Images
Available for: OS X El Capitan v10.11 and v10.11.1
Impact: A local user may be able to execute arbitrary code with kernel privileges
Description: A memory corruption issue existed in the parsing of disk images. This issue was addressed through improved memory handling.
CVE-ID
CVE-2015-7110 : Ian Beer of Google Project Zero
EFI
Available for: OS X El Capitan v10.11 and v10.11.1
Impact: A local user may be able to execute arbitrary code with system privileges
Description: A path validation issue existed in the kernel loader. This was addressed through improved environment sanitization.
CVE-ID
CVE-2015-7063 : Apple
File Bookmark
Available for: OS X El Capitan v10.11 and v10.11.1
Impact: A sandboxed process may be able to circumvent sandbox restrictions
Description: A path validation issue existed in app scoped bookmarks. This was addressed through improved environment sanitization.
CVE-ID
CVE-2015-7071 : Apple
Hypervisor
Available for: OS X El Capitan v10.11 and v10.11.1
Impact: A local user may be able to execute arbitrary code with system privileges
Description: A use after free issue existed in the handling of VM objects. This issue was addressed through improved memory management.
CVE-ID
CVE-2015-7078 : Ian Beer of Google Project Zero
iBooks
Available for: OS X El Capitan v10.11 and v10.11.1
Impact: Parsing a maliciously crafted iBooks file may lead to disclosure of user information
Description: An XML external entity reference issue existed with iBook parsing. This issue was addressed through improved parsing.
CVE-ID
CVE-2015-7081 : Behrouz Sadeghipour (@Nahamsec) and Patrik Fehrenbach (@ITSecurityguard)
ImageIO
Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 and v10.11.1
Impact: Processing a maliciously crafted image may lead to arbitrary code execution
Description: A memory corruption issue existed in ImageIO. This issue was addressed through improved memory handling.
CVE-ID
CVE-2015-7053 : Apple
Intel Graphics Driver
Available for: OS X El Capitan v10.11 and v10.11.1
Impact: A local user may be able to execute arbitrary code with system privileges
Description: A null pointer dereference issue was addressed through improved input validation.
CVE-ID
CVE-2015-7076 : Juwei Lin of TrendMicro, beist and ABH of BoB, and JeongHoon [email protected]
2015 Mac Os X 10.11 El Capitan
Intel Graphics Driver
Available for: OS X El Capitan v10.11 and v10.11.1
Impact: A local user may be able to execute arbitrary code with system privileges
Description: A memory corruption issue existed in the Intel Graphics Driver. This issue was addressed through improved memory handling.
CVE-ID
CVE-2015-7106 : Ian Beer of Google Project Zero, Juwei Lin of TrendMicro, beist and ABH of BoB, and JeongHoon [email protected]
Intel Graphics Driver
Available for: OS X El Capitan v10.11 and v10.11.1
Impact: A local user may be able to execute arbitrary code with system privileges
Description: An out of bounds memory access issue existed in the Intel Graphics Driver. This issue was addressed through improved memory handling.
CVE-ID
CVE-2015-7077 : Ian Beer of Google Project Zero
IOAcceleratorFamily
Available for: OS X El Capitan v10.11 and v10.11.1
Impact: A malicious application may be able to execute arbitrary code with system privileges
Description: A memory corruption issue existed in IOAcceleratorFamily. This issue was addressed through improved memory handling.
CVE-ID
CVE-2015-7109 : Juwei Lin of TrendMicro
IOHIDFamily
Available for: OS X El Capitan v10.11 and v10.11.1
Impact: A malicious application may be able to execute arbitrary code with system privileges
Description: Multiple memory corruption issues existed in IOHIDFamily API. These issues were addressed through improved memory handling.
CVE-ID
CVE-2015-7111 : beist and ABH of BoB
CVE-2015-7112 : Ian Beer of Google Project Zero
IOKit SCSI
Available for: OS X El Capitan v10.11 and v10.11.1
Impact: A malicious application may be able to execute arbitrary code with kernel privileges
Description: A null pointer dereference existed in the handling of a certain userclient type. This issue was addressed through improved validation.
CVE-ID
CVE-2015-7068 : Ian Beer of Google Project Zero
IOThunderboltFamily
Available for: OS X El Capitan v10.11 and v10.11.1
Impact: A local user may be able to cause a system denial of service
Description: A null pointer dereference existed in IOThunderboltFamily's handling of certain userclient types. This issue was addressed through improved validation of IOThunderboltFamily contexts.
CVE-ID
CVE-2015-7067 : Juwei Lin of TrendMicro
Mac Os X El Capitan 10.11.0
Kernel
Available for: OS X El Capitan v10.11 and v10.11.1
Impact: A local application may be able to cause a denial of service
Description: Multiple denial of service issues were addressed through improved memory handling.
CVE-ID
CVE-2015-7040 : Lufeng Li of Qihoo 360 Vulcan Team
CVE-2015-7041 : Lufeng Li of Qihoo 360 Vulcan Team
CVE-2015-7042 : Lufeng Li of Qihoo 360 Vulcan Team
CVE-2015-7043 : Tarjei Mandt (@kernelpool)
Kernel
Available for: OS X El Capitan v10.11 and v10.11.1
Impact: A local user may be able to execute arbitrary code with kernel privileges
Description: Multiple memory corruption issues existed in the kernel. These issues were addressed through improved memory handling.
CVE-ID
CVE-2015-7083 : Ian Beer of Google Project Zero
CVE-2015-7084 : Ian Beer of Google Project Zero
Kernel
Available for: OS X El Capitan v10.11 and v10.11.1
Impact: A local user may be able to execute arbitrary code with kernel privileges
Description: An issue existed in the parsing of mach messages. This issue was addressed through improved validation of mach messages.
CVE-ID
CVE-2015-7047 : Ian Beer of Google Project Zero
kext tools
Available for: OS X El Capitan v10.11 and v10.11.1
Impact: A local user may be able to execute arbitrary code with kernel privileges
Description: A validation issue existed during the loading of kernel extensions. This issue was addressed through additional verification.
CVE-ID
CVE-2015-7052 : Apple
Keychain Access
Available for: OS X El Capitan v10.11 and v10.11.1
Impact: A malicious application may be able to masquerade as the Keychain Server.
Description: An issue existed in how Keychain Access interacted with Keychain Agent. This issue was resolved by removing legacy functionality.
CVE-ID
CVE-2015-7045 : Luyi Xing and XiaoFeng Wang of Indiana University Bloomington, Xiaolong Bai of Indiana University Bloomington and Tsinghua University, Tongxin Li of Peking University, Kai Chen of Indiana University Bloomington and Institute of Information Engineering, Xiaojing Liao of Georgia Institute of Technology, Shi-Min Hu of Tsinghua University, and Xinhui Han of Peking University
libarchive
Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 and v10.11.1
Impact: Visiting a maliciously crafted website may lead to arbitrary code execution
Description: A memory corruption issue existed in the processing of archives. This issue was addressed through improved memory handling.
CVE-ID
CVE-2011-2895 : @practicalswift
libc
Available for: OS X El Capitan v10.11 and v10.11.1
Impact: Processing a maliciously crafted package may lead to arbitrary code execution
Description: Multiple buffer overflows existed in the C standard library. These issues were addressed through improved bounds checking.
CVE-ID
CVE-2015-7038 : Brian D. Wells of E. W. Scripps, Narayan Subramanian of Symantec Corporation/Veritas LLC
Available for: OS X El Capitan v10.11 and v10.11.1
Impact: Multiple vulnerabilities in expat
Description: Multiple vulnerabilities existed in expat version prior to 2.1.0. These were addressed by updating expat to versions 2.1.0.
CVE-ID
CVE-2012-0876 : Vincent Danen
CVE-2012-1147 : Kurt Seifried
CVE-2012-1148 : Kurt Seifried
libxml2
Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 and v10.11.1
Impact: Parsing a maliciously crafted XML document may lead to disclosure of user information
Description: A memory corruption issue existed in the parsing of XML files. This issue was addressed through improved memory handling.
CVE-ID
CVE-2015-7115 : Wei Lei and Liu Yang of Nanyang Technological University
CVE-2015-7116 : Wei Lei and Liu Yang of Nanyang Technological University
OpenGL
Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 and v10.11.1
Impact: Visiting a maliciously crafted website may lead to arbitrary code execution
Description: Multiple memory corruption issues existed in OpenGL. These issues were addressed through improved memory handling.
CVE-ID
CVE-2015-7064 : Apple
CVE-2015-7065 : Apple
CVE-2015-7066 : Tongbo Luo and Bo Qu of Palo Alto Networks
OpenLDAP
Available for: OS X El Capitan v10.11 and v10.11.1
Impact: A remote unauthenticated client may be able to cause a denial of service
Description: An input validation issue existed in OpenLDAP. This issue was addressed through improved input validation.
CVE-ID
CVE-2015-6908
OpenSSH
Available for: OS X El Capitan v10.11 and v10.11.1
Impact: Multiple vulnerabilities in LibreSSL
Description: Multiple vulnerabilities existed in LibreSSL versions prior to 2.1.8. These were addressed by updating LibreSSL to version 2.1.8.
CVE-ID
CVE-2015-5333
CVE-2015-5334
QuickLook
Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 and v10.11.1
Impact: Opening a maliciously crafted iWork file may lead to arbitrary code execution
Description: A memory corruption issue existed in the handling of iWork files. This issue was addressed through improved memory handling.
CVE-ID
CVE-2015-7107
Sandbox
Available for: OS X El Capitan v10.11 and v10.11.1
Impact: A malicious application with root privileges may be able to bypass kernel address space layout randomization
Description: An insufficient privilege separation issue existed in xnu. This issue was addressed by improved authorization checks.
CVE-ID
CVE-2015-7046 : Apple
Security
Available for: OS X El Capitan v10.11 and v10.11.1
Impact: A remote attacker may cause an unexpected application termination or arbitrary code execution
Description: A memory corruption issue existed in handling SSL handshakes. This issue was addressed through improved memory handling.
CVE-ID
CVE-2015-7073 : Benoit Foucher of ZeroC, Inc.
Security
Available for: OS X Mavericks v10.9.5 and OS X Yosemite v10.10.5
Impact: Processing a maliciously crafted certificate may lead to arbitrary code execution
Description: Multiple memory corruption issues existed in the ASN.1 decoder. These issues were addressed through improved input validation
CVE-ID
CVE-2015-7059 : David Keeler of Mozilla
CVE-2015-7060 : Tyson Smith of Mozilla
CVE-2015-7061 : Ryan Sleevi of Google
Security
Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 and v10.11.1
Impact: A malicious application may gain access to a user's Keychain items
Description: An issue existed in the validation of access control lists for keychain items. This issue was addressed through improved access control list checks.
CVE-ID
CVE-2015-7058
System Integrity Protection
Available for: OS X El Capitan v10.11 and v10.11.1
Impact: A malicious application with root privileges may be able to execute arbitrary code with system privileges
Description: A privilege issue existed in handling union mounts. This issue was addressed by improved authorization checks.
CVE-ID
CVE-2015-7044 : MacDefender
Notes
Security Update 2015-005 and 2015-008 is recommended for all users and improves the security of OS X. After installing this update, the QuickTime 7 web browser plug-in will no longer be enabled by default. Learn what to do if you still need this legacy plug-in.
OS X El Capitan v10.11.2 includes the security content of Safari 9.0.2.