You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

1482 lines
100 KiB

  1. <!DOCTYPE html>
  2. <html prefix="og: http://ogp.me/ns#" dir="ltr" lang="en"><head>
  3. <meta http-equiv="X-UA-Compatible" content="IE=edge">
  4. <meta name="viewport" content="width=device-width, initial-scale=1">
  5. <meta http-equiv="content-type" content="text/html; charset=UTF-8">
  6. <title lang="en">About the security content of macOS Big Sur 11.0.1 - Apple Support</title>
  7. <link rel="dns-prefetch" href="https://www.apple.com/">
  8. <link rel="preconnect" href="https://www.apple.com/" crossorigin="">
  9. <link rel="canonical" href="https://support.apple.com/en-us/HT211931">
  10. <link rel="alternate" hreflang="en-ie" href="https://support.apple.com/en-ie/HT211931">
  11. <link rel="alternate" hreflang="ar-kw" href="https://support.apple.com/ar-kw/HT211931">
  12. <link rel="alternate" hreflang="en-il" href="https://support.apple.com/en-il/HT211931">
  13. <link rel="alternate" hreflang="en-in" href="https://support.apple.com/en-in/HT211931">
  14. <link rel="alternate" hreflang="en-ae" href="https://support.apple.com/en-ae/HT211931">
  15. <link rel="alternate" hreflang="en-za" href="https://support.apple.com/en-za/HT211931">
  16. <link rel="alternate" hreflang="no-no" href="https://support.apple.com/no-no/HT211931">
  17. <link rel="alternate" hreflang="en-al" href="https://support.apple.com/en-al/HT211931">
  18. <link rel="alternate" hreflang="en-is" href="https://support.apple.com/en-is/HT211931">
  19. <link rel="alternate" hreflang="el-gr" href="https://support.apple.com/el-gr/HT211931">
  20. <link rel="alternate" hreflang="en-am" href="https://support.apple.com/en-am/HT211931">
  21. <link rel="alternate" hreflang="nl-nl" href="https://support.apple.com/nl-nl/HT211931">
  22. <link rel="alternate" hreflang="en-au" href="https://support.apple.com/en-au/HT211931">
  23. <link rel="alternate" hreflang="he-il" href="https://support.apple.com/he-il/HT211931">
  24. <link rel="alternate" hreflang="hu-hu" href="https://support.apple.com/hu-hu/HT211931">
  25. <link rel="alternate" hreflang="en-jo" href="https://support.apple.com/en-jo/HT211931">
  26. <link rel="alternate" hreflang="en-bh" href="https://support.apple.com/en-bh/HT211931">
  27. <link rel="alternate" hreflang="es-cl" href="https://support.apple.com/es-cl/HT211931">
  28. <link rel="alternate" hreflang="fr-sn" href="https://support.apple.com/fr-sn/HT211931">
  29. <link rel="alternate" hreflang="fr-ca" href="https://support.apple.com/fr-ca/HT211931">
  30. <link rel="alternate" hreflang="es-co" href="https://support.apple.com/es-co/HT211931">
  31. <link rel="alternate" hreflang="pl-pl" href="https://support.apple.com/pl-pl/HT211931">
  32. <link rel="alternate" hreflang="en-bn" href="https://support.apple.com/en-bn/HT211931">
  33. <link rel="alternate" hreflang="pt-pt" href="https://support.apple.com/pt-pt/HT211931">
  34. <link rel="alternate" hreflang="en-sa" href="https://support.apple.com/en-sa/HT211931">
  35. <link rel="alternate" hreflang="fr-be" href="https://support.apple.com/fr-be/HT211931">
  36. <link rel="alternate" hreflang="ar-eg" href="https://support.apple.com/ar-eg/HT211931">
  37. <link rel="alternate" hreflang="en-bw" href="https://support.apple.com/en-bw/HT211931">
  38. <link rel="alternate" hreflang="en-sg" href="https://support.apple.com/en-sg/HT211931">
  39. <link rel="alternate" hreflang="en-ke" href="https://support.apple.com/en-ke/HT211931">
  40. <link rel="alternate" hreflang="hr-hr" href="https://support.apple.com/hr-hr/HT211931">
  41. <link rel="alternate" hreflang="en-om" href="https://support.apple.com/en-om/HT211931">
  42. <link rel="alternate" hreflang="zh-mo" href="https://support.apple.com/zh-mo/HT211931">
  43. <link rel="alternate" hreflang="de-at" href="https://support.apple.com/de-at/HT211931">
  44. <link rel="alternate" hreflang="en-gu" href="https://support.apple.com/en-gu/HT211931">
  45. <link rel="alternate" hreflang="en-gw" href="https://support.apple.com/en-gw/HT211931">
  46. <link rel="alternate" hreflang="fr-gn" href="https://support.apple.com/fr-gn/HT211931">
  47. <link rel="alternate" hreflang="fr-gq" href="https://support.apple.com/fr-gq/HT211931">
  48. <link rel="alternate" hreflang="cs-cz" href="https://support.apple.com/cs-cz/HT211931">
  49. <link rel="alternate" hreflang="en-ph" href="https://support.apple.com/en-ph/HT211931">
  50. <link rel="alternate" hreflang="zh-tw" href="https://support.apple.com/zh-tw/HT211931">
  51. <link rel="alternate" hreflang="ko-kr" href="https://support.apple.com/ko-kr/HT211931">
  52. <link rel="alternate" hreflang="en-hk" href="https://support.apple.com/en-hk/HT211931">
  53. <link rel="alternate" hreflang="sk-sk" href="https://support.apple.com/sk-sk/HT211931">
  54. <link rel="alternate" hreflang="ru-ru" href="https://support.apple.com/ru-ru/HT211931">
  55. <link rel="alternate" hreflang="en-qa" href="https://support.apple.com/en-qa/HT211931">
  56. <link rel="alternate" hreflang="sv-se" href="https://support.apple.com/sv-se/HT211931">
  57. <link rel="alternate" hreflang="da-dk" href="https://support.apple.com/da-dk/HT211931">
  58. <link rel="alternate" hreflang="en-us" href="https://support.apple.com/en-us/HT211931">
  59. <link rel="alternate" hreflang="en-mk" href="https://support.apple.com/en-mk/HT211931">
  60. <link rel="alternate" hreflang="en-mn" href="https://support.apple.com/en-mn/HT211931">
  61. <link rel="alternate" hreflang="en-eg" href="https://support.apple.com/en-eg/HT211931">
  62. <link rel="alternate" hreflang="en-mo" href="https://support.apple.com/en-mo/HT211931">
  63. <link rel="alternate" hreflang="fr-ne" href="https://support.apple.com/fr-ne/HT211931">
  64. <link rel="alternate" hreflang="en-mt" href="https://support.apple.com/en-mt/HT211931">
  65. <link rel="alternate" hreflang="nl-be" href="https://support.apple.com/nl-be/HT211931">
  66. <link rel="alternate" hreflang="zh-cn" href="https://support.apple.com/zh-cn/HT211931">
  67. <link rel="alternate" hreflang="en-mz" href="https://support.apple.com/en-mz/HT211931">
  68. <link rel="alternate" hreflang="fr-ml" href="https://support.apple.com/fr-ml/HT211931">
  69. <link rel="alternate" hreflang="en-my" href="https://support.apple.com/en-my/HT211931">
  70. <link rel="alternate" hreflang="fr-mu" href="https://support.apple.com/fr-mu/HT211931">
  71. <link rel="alternate" hreflang="en-ng" href="https://support.apple.com/en-ng/HT211931">
  72. <link rel="alternate" hreflang="el-cy" href="https://support.apple.com/el-cy/HT211931">
  73. <link rel="alternate" hreflang="en-vn" href="https://support.apple.com/en-vn/HT211931">
  74. <link rel="alternate" hreflang="ja-jp" href="https://support.apple.com/ja-jp/HT211931">
  75. <link rel="alternate" hreflang="de-ch" href="https://support.apple.com/de-ch/HT211931">
  76. <link rel="alternate" hreflang="en-nz" href="https://support.apple.com/en-nz/HT211931">
  77. <link rel="alternate" hreflang="ro-ro" href="https://support.apple.com/ro-ro/HT211931">
  78. <link rel="alternate" hreflang="it-ch" href="https://support.apple.com/it-ch/HT211931">
  79. <link rel="alternate" hreflang="tr-tr" href="https://support.apple.com/tr-tr/HT211931">
  80. <link rel="alternate" hreflang="fr-fr" href="https://support.apple.com/fr-fr/HT211931">
  81. <link rel="alternate" hreflang="en-gb" href="https://support.apple.com/en-gb/HT211931">
  82. <link rel="alternate" hreflang="fi-fi" href="https://support.apple.com/fi-fi/HT211931">
  83. <link rel="alternate" hreflang="en-ca" href="https://support.apple.com/en-ca/HT211931">
  84. <link rel="alternate" hreflang="fr-tn" href="https://support.apple.com/fr-tn/HT211931">
  85. <link rel="alternate" hreflang="ar-ae" href="https://support.apple.com/ar-ae/HT211931">
  86. <link rel="alternate" hreflang="en-kw" href="https://support.apple.com/en-kw/HT211931">
  87. <link rel="alternate" hreflang="fr-cf" href="https://support.apple.com/fr-cf/HT211931">
  88. <link rel="alternate" hreflang="fr-ci" href="https://support.apple.com/fr-ci/HT211931">
  89. <link rel="alternate" hreflang="fr-ch" href="https://support.apple.com/fr-ch/HT211931">
  90. <link rel="alternate" hreflang="es-us" href="https://support.apple.com/es-us/HT211931">
  91. <link rel="alternate" hreflang="fr-cm" href="https://support.apple.com/fr-cm/HT211931">
  92. <link rel="alternate" hreflang="en-lb" href="https://support.apple.com/en-lb/HT211931">
  93. <link rel="alternate" hreflang="ar-sa" href="https://support.apple.com/ar-sa/HT211931">
  94. <link rel="alternate" hreflang="de-de" href="https://support.apple.com/de-de/HT211931">
  95. <link rel="alternate" hreflang="en-lk" href="https://support.apple.com/en-lk/HT211931">
  96. <link rel="alternate" hreflang="fr-ma" href="https://support.apple.com/fr-ma/HT211931">
  97. <link rel="alternate" hreflang="zh-hk" href="https://support.apple.com/zh-hk/HT211931">
  98. <link rel="alternate" hreflang="pt-br" href="https://support.apple.com/pt-br/HT211931">
  99. <link rel="alternate" hreflang="de-li" href="https://support.apple.com/de-li/HT211931">
  100. <link rel="alternate" hreflang="ar-bh" href="https://support.apple.com/ar-bh/HT211931">
  101. <link rel="alternate" hreflang="es-es" href="https://support.apple.com/es-es/HT211931">
  102. <link rel="alternate" hreflang="fr-mg" href="https://support.apple.com/fr-mg/HT211931">
  103. <link rel="alternate" hreflang="ar-jo" href="https://support.apple.com/ar-jo/HT211931">
  104. <link rel="alternate" hreflang="es-mx" href="https://support.apple.com/es-mx/HT211931">
  105. <link rel="alternate" hreflang="it-it" href="https://support.apple.com/it-it/HT211931">
  106. <link rel="alternate" hreflang="en-ug" href="https://support.apple.com/en-ug/HT211931">
  107. <link rel="alternate" hreflang="id-id" href="https://support.apple.com/id-id/HT211931">
  108. <link rel="alternate" hreflang="de-lu" href="https://support.apple.com/de-lu/HT211931">
  109. <link rel="alternate" hreflang="en-md" href="https://support.apple.com/en-md/HT211931">
  110. <link rel="alternate" hreflang="fr-lu" href="https://support.apple.com/fr-lu/HT211931">
  111. <link rel="alternate" hreflang="en-me" href="https://support.apple.com/en-me/HT211931">
  112. <link rel="alternate" hreflang="th-th" href="https://support.apple.com/th-th/HT211931">
  113. <meta name="description" content="This document describes the security content of macOS&nbsp;Big Sur 11.0.1.
  114. ">
  115. <meta property="og:url" content="https://support.apple.com/en-us/HT211931">
  116. <meta property="og:title" content="About the security content of macOS Big Sur 11.0.1">
  117. <meta property="og:description" content="This document describes the security content of macOS&nbsp;Big Sur 11.0.1.
  118. ">
  119. <meta property="og:site_name" content="Apple Support">
  120. <meta property="og:locale" content="en_US">
  121. <meta property="og:type" content="article">
  122. <meta name="ac-gn-search-field[locale]" content="en_US">
  123. <script type="application/ld+json">{ "@context": "https://ziyuan.baidu.com/contexts/cambrian.jsonld","@id":"https://support.apple.com/en-us/HT211931","appid": "1583465330249689","title":"About the security ","pubDate":"2020-10-31T12:48:36","upDate":"2020-12-17T09:16:36"}</script>
  124. <link rel="stylesheet" href="About%20the%20security%20content%20of%20macOS%20Big%20Sur%2011.0.1%20-%20Apple%20Support_files/app-ht.css" type="text/css">
  125. <link rel="stylesheet" href="About%20the%20security%20content%20of%20macOS%20Big%20Sur%2011.0.1%20-%20Apple%20Support_files/ac-globalfooter.css" type="text/css">
  126. <link rel="stylesheet" href="About%20the%20security%20content%20of%20macOS%20Big%20Sur%2011.0.1%20-%20Apple%20Support_files/ac-globalnav.css" type="text/css">
  127. <link rel="stylesheet" href="About%20the%20security%20content%20of%20macOS%20Big%20Sur%2011.0.1%20-%20Apple%20Support_files/fonts.css" type="text/css">
  128. <script>
  129. var _applemd = {
  130. page: {
  131. site_section: "kb",
  132. content_type: "ht",
  133. info_type: "update",
  134. topics: "security update",
  135. in_house: "domain,security &amp; cert update",
  136. locale: "en-us",
  137. friendly_content: {
  138. title: "About the security content of macOS Big Sur 11.0.1",
  139. publish_date: "12172020",
  140. content_id: "HT211931",
  141. status: "unarchieved",
  142. version: "1.4"
  143. },
  144. testandtarget:{
  145. throttle:"0.0"
  146. },
  147. },
  148. product: {
  149. list: ["acs::kb::productcategory::product security",]
  150. }
  151. }
  152. </script>
  153. <script src="About%20the%20security%20content%20of%20macOS%20Big%20Sur%2011.0.1%20-%20Apple%20Support_files/nn.js" type="text/javascript" charset="utf-8"></script>
  154. <script>
  155. var neighborInitData = {
  156. appDataSchemaVersion: '2.0.0',
  157. endpoint: 'https://supportmetrics.apple.com/content/services/stats'
  158. }
  159. </script>
  160. <script>
  161. var data = {
  162. showHelpFulfeedBack: true,
  163. id: "HT211931",
  164. locale: "en_US",
  165. podCookie: "us~en",
  166. urlLocale: "en-us",
  167. isPreview : false,
  168. productCategories : "PP23",
  169. source : "",
  170. channel : "HOWTO_ARTICLES",
  171. bizChatLink : "https://bcrw.apple.com/urn:biz:b15ed773-9eed-11e7-baa2-7b88b04daa8e",
  172. bizChatIntentId : "ContactApple",
  173. bizChatGroupId : "%7B%22domain%22:%20%22AC%22,%22origin%22:%20%22OLS%22,%22page%22:%20%22acs::kb::ht::ARTICLEID::contact%20apple%20for%20support%20and%20service%20(en-us)%22%7D",
  174. bizChatBody : "%3Cstrong%3EChat using Messages%3C/strong%3E %3Cbr%3E Have a question? Ask now.",
  175. bizChatSupportedCountries : "US",
  176. bizChatthrottleValue : 0.0,
  177. bypassBizChat: false,
  178. akamaiEdgeScapeURL: "https://support.apple.com/edge-sight",
  179. isNeighborJsEnabled: true,
  180. isOkapiEnabled: false,
  181. domain: "support.apple.com",
  182. dtmPageName: "acs.pageload"
  183. }
  184. window.appState = JSON.stringify(data);
  185. document.cookie = 'POD=us~en; path=/; domain=.apple.com; expires='+new Date(Date.now() + (28 * 24 * 60 * 60 * 1000)).toGMTString();
  186. </script>
  187. <link rel="stylesheet" href="About%20the%20security%20content%20of%20macOS%20Big%20Sur%2011.0.1%20-%20Apple%20Support_files/accs-offer.css"></head>
  188. <body class="ac-gn-current-support js" itemscope="" itemtype="https://schema.org/TechArticle" data-new-gr-c-s-check-loaded="8.869.0" data-gr-ext-installed="">
  189. <meta name="ac-gn-store-key" content="S2A49YFKJF2JAT22K"><meta name="ac-gn-search-action" content="https://support.apple.com/kb/index"><meta name="ac-gn-search-input" content="q"><meta name="ac-gn-search-field[src]" content="globalnav_support"><meta name="ac-gn-search-field[type]" content="organic"><meta name="ac-gn-search-field[page]" content="search"><meta name="ac-gn-search-field[locale]" content="en_US"><link onerror="headerCssFallback()" rel="stylesheet" type="text/css" href="About%20the%20security%20content%20of%20macOS%20Big%20Sur%2011.0.1%20-%20Apple%20Support_files/ac-globalnav.css"><aside id="ac-gn-segmentbar" class="ac-gn-segmentbar" dir="ltr" data-strings="{ 'exit': 'Exit', 'view': '{%STOREFRONT%} Store Home', 'segments': { 'smb': 'Business Store Home', 'eduInd': 'Education Store Home', 'other': 'Store Home' } }" lang="en-US"></aside><input type="checkbox" id="ac-gn-menustate" class="ac-gn-menustate"><nav id="ac-globalnav" class="js no-touch windows" role="navigation" aria-label="Global" data-hires="false" data-analytics-region="global nav" dir="ltr" data-www-domain="www.apple.com" data-store-locale="us" data-store-root-path="/us" data-store-api="https://www.apple.com/[storefront]/shop/bag/status" data-search-locale="en_US" data-search-suggestions-api="https://www.apple.com/search-services/suggestions/" data-search-defaultlinks-api="https://www.apple.com/search-services/suggestions/defaultlinks/" lang="en-US"><div class="ac-gn-content"><ul class="ac-gn-header"><li class="ac-gn-item ac-gn-menuicon"><label class="ac-gn-menuicon-label" for="ac-gn-menustate" aria-hidden="true"><span class="ac-gn-menuicon-bread ac-gn-menuicon-bread-top"><span class="ac-gn-menuicon-bread-crust ac-gn-menuicon-bread-crust-top"></span></span><span class="ac-gn-menuicon-bread ac-gn-menuicon-bread-bottom"><span class="ac-gn-menuicon-bread-crust ac-gn-menuicon-bread-crust-bottom"></span></span></label><a href="#ac-gn-menustate" role="button" class="ac-gn-menuanchor ac-gn-menuanchor-open" id="ac-gn-menuanchor-open"><span class="ac-gn-menuanchor-label">Global Nav Open Menu</span></a><a href="#" role="button" class="ac-gn-menuanchor ac-gn-menuanchor-close" id="ac-gn-menuanchor-close"><span class="ac-gn-menuanchor-label">Global Nav Close Menu</span></a></li><li class="ac-gn-item ac-gn-apple"><a class="ac-gn-link ac-gn-link-apple" href="https://www.apple.com/" data-analytics-title="apple home" id="ac-gn-firstfocus-small"><span class="ac-gn-link-text">Apple</span></a></li><li class="ac-gn-item ac-gn-bag ac-gn-bag-small" id="ac-gn-bag-small"><div class="ac-gn-bag-wrapper"><a class="ac-gn-link ac-gn-link-bag" href="https://www.apple.com/us/shop/goto/bag" data-analytics-title="bag" data-analytics-click="bag" aria-label="Shopping Bag" data-string-badge="Shopping Bag with item count :" role="button" aria-haspopup="true" aria-expanded="false" aria-controls="ac-gn-bagview-content"><span class="ac-gn-link-text">Shopping Bag</span></a><span class="ac-gn-bag-badge"><span class="ac-gn-bag-badge-separator"></span><span class="ac-gn-bag-badge-number"></span><span class="ac-gn-bag-badge-unit">+</span></span></div><span class="ac-gn-bagview-caret ac-gn-bagview-caret-large"></span></li></ul><div class="ac-gn-search-placeholder-container" role="search"><div class="ac-gn-search ac-gn-search-small"><a id="ac-gn-link-search-small" class="ac-gn-link" href="https://support.apple.com/kb/index?page=search&amp;locale=en_US" data-analytics-title="search" data-analytics-click="search" data-analytics-intrapage-link="" aria-label="Search Support" role="button" aria-haspopup="true"><div class="ac-gn-search-placeholder-bar"><div class="ac-gn-search-placeholder-input"><div class="ac-gn-search-placeholder-input-text" aria-hidden="true"><div class="ac-gn-link-search ac-gn-search-placeholder-input-icon"></div><span class="ac-gn-search-placeholder">Search Support</span></div></div><div class="ac-gn-searchview-close ac-gn-searchview-close-small ac-gn-search-placeholder-searchview-close"><span class="ac-gn-searchview-close-cancel" aria-hidden="true">Cancel</span></div
  190. <div class="ac-gn-searchresults-section-wrapper">
  191. <h3 class="ac-gn-searchresults-header ac-gn-searchresults-animated">Quick Links</h3>
  192. <ul class="ac-gn-searchresults-list" id="defaultlinks" role="listbox">
  193. <li class="ac-gn-searchresults-item ac-gn-searchresults-animated" role="presentation">
  194. <a href="https://support.apple.com/en-us/HT201487" role="option" class="ac-gn-searchresults-link ac-gn-searchresults-link-defaultlinks" data-query="no keyword" data-section="defaultlinks" data-items="5" data-index="0" data-label="If you forgot your Apple ID password" data-analytics-click="eVar23: {data-query} | {data-section} | {data-items} | {data-label} | {data-index}, events:event50">If you forgot your Apple ID password</a>
  195. </li>
  196. <li class="ac-gn-searchresults-item ac-gn-searchresults-animated" role="presentation">
  197. <a href="https://support.apple.com/en-us/HT204306" role="option" class="ac-gn-searchresults-link ac-gn-searchresults-link-defaultlinks" data-query="no keyword" data-section="defaultlinks" data-items="5" data-index="1" data-label="If you forgot the passcode for your iPhone, iPad, or iPod touch" data-analytics-click="eVar23: {data-query} | {data-section} | {data-items} | {data-label} | {data-index}, events:event50">If you forgot the passcode for your iPhone, iPad, or iPod touch</a>
  198. </li>
  199. <li class="ac-gn-searchresults-item ac-gn-searchresults-animated" role="presentation">
  200. <a href="https://support.apple.com/en-us/HT202039" role="option" class="ac-gn-searchresults-link ac-gn-searchresults-link-defaultlinks" data-query="no keyword" data-section="defaultlinks" data-items="5" data-index="2" data-label="View, change, or cancel your subscriptions" data-analytics-click="eVar23: {data-query} | {data-section} | {data-items} | {data-label} | {data-index}, events:event50">View, change, or cancel your subscriptions</a>
  201. </li>
  202. <li class="ac-gn-searchresults-item ac-gn-searchresults-animated" role="presentation">
  203. <a href="https://support.apple.com/en-us/HT204204" role="option" class="ac-gn-searchresults-link ac-gn-searchresults-link-defaultlinks" data-query="no keyword" data-section="defaultlinks" data-items="5" data-index="3" data-label="Update iOS on your device" data-analytics-click="eVar23: {data-query} | {data-section} | {data-items} | {data-label} | {data-index}, events:event50">Update iOS on your device</a>
  204. </li>
  205. <li class="ac-gn-searchresults-item ac-gn-searchresults-animated" role="presentation">
  206. <a href="https://support.apple.com/contact" role="option" class="ac-gn-searchresults-link ac-gn-searchresults-link-defaultlinks" data-query="no keyword" data-section="defaultlinks" data-items="5" data-index="4" data-label="Contact Apple Support" data-analytics-click="eVar23: {data-query} | {data-section} | {data-items} | {data-label} | {data-index}, events:event50">Contact Apple Support</a>
  207. </li>
  208. </ul>
  209. <span role="status" class="ac-gn-searchresults-count" aria-live="polite">5 Quick Links</span>
  210. </div>
  211. </section>
  212. </aside></div><button id="ac-gn-searchview-close" class="ac-gn-searchview-close" aria-label="Cancel Search"><span class="ac-gn-searchview-close-wrapper"><span class="ac-gn-searchview-close-left"></span><span class="ac-gn-searchview-close-right"></span></span></button></aside><aside class="ac-gn-bagview" data-analytics-region="bag"><div class="ac-gn-bagview-scrim"><span class="ac-gn-bagview-caret ac-gn-bagview-caret-small"></span></div><div class="ac-gn-bagview-content" id="ac-gn-bagview-content"></div></aside></div></nav><div class="ac-gn-blur"></div><div id="ac-gn-curtain" class="ac-gn-curtain"></div><div id="ac-gn-placeholder" class="ac-nav-placeholder"></div>
  213. <div id="app">
  214. <div>
  215. <section class="section section-content">
  216. <div>
  217. <div class="column small-12 medium-12 large-12 large-centered text-center">
  218. <div class="main" role="main" id="howto-section">
  219. <div id="content">
  220. <h1 id="howto-title" itemprop="headline">About the security content of macOS Big Sur 11.0.1</h1>
  221. <div class="intro"><p>This document describes the security content of macOS&nbsp;Big Sur 11.0.1.</p>
  222. </div>
  223. <div itemprop="author" itemscope="" itemtype="http://schema.org/Organization">
  224. <meta itemprop="name" content="Apple">
  225. </div>
  226. <div id="sections" itemprop="articleBody">
  227. <div>
  228. <h2>About Apple security updates</h2>
  229. <div><p>For our customers' protection, Apple doesn't
  230. disclose, discuss, or confirm security issues until an investigation has
  231. occurred and patches or releases are available. Recent releases are
  232. listed on the&nbsp;<a href="https://support.apple.com/kb/HT201222">Apple security updates</a>&nbsp;page.</p>
  233. <p>Apple security documents reference vulnerabilities by&nbsp;<a href="http://cve.mitre.org/about/">CVE-ID</a>&nbsp;when possible.</p>
  234. <p>For more information about security, see the&nbsp;<a href="https://support.apple.com/kb/HT201220">Apple Product Security</a>&nbsp;page.</p>
  235. </div>
  236. </div>
  237. <div>
  238. <div><p><img alt="" src="About%20the%20security%20content%20of%20macOS%20Big%20Sur%2011.0.1%20-%20Apple%20Support_files/divider.png"></p>
  239. </div>
  240. </div>
  241. <div>
  242. <h2>macOS Big Sur 11.0.1</h2>
  243. <div><p><span class="note">Released November 12, 2020</span></p>
  244. <p><strong>AMD</strong></p>
  245. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  246. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  247. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  248. iMac Pro (all models)</p>
  249. <p style="margin-left: 40px;">Impact: A malicious application may be able to execute arbitrary code with system privileges</p>
  250. <p style="margin-left: 40px;">Description: A memory corruption issue was addressed with improved input validation.</p>
  251. <p style="margin-left: 40px;">CVE-2020-27914: Yu Wang of Didi Research America</p>
  252. <p style="margin-left: 40px;">CVE-2020-27915: Yu Wang of Didi Research America</p>
  253. <p style="margin-left: 40px;"><span class="note">Entry added December 14, 2020</span>
  254. </p><p><strong>App Store</strong></p>
  255. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  256. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  257. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  258. iMac Pro (all models)</p>
  259. <p style="margin-left: 40px;">Impact: An application may be able to gain elevated privileges</p>
  260. <p style="margin-left: 40px;">Description: This issue was addressed by removing the vulnerable code.</p>
  261. <p style="margin-left: 40px;">CVE-2020-27903: Zhipeng Huo (@R3dF09) of Tencent Security Xuanwu Lab</p>
  262. <p><strong>Audio</strong></p>
  263. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  264. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  265. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  266. iMac Pro (all models)</p>
  267. <p style="margin-left: 40px;">Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution</p>
  268. <p style="margin-left: 40px;">Description: An out-of-bounds read was addressed with improved input validation.</p>
  269. <p style="margin-left: 40px;">CVE-2020-27910: JunDong Xie and XingWei Lin of Ant Security Light-Year Lab</p>
  270. <p><strong>Audio</strong></p>
  271. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  272. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  273. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  274. iMac Pro (all models)</p>
  275. <p style="margin-left: 40px;">Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution</p>
  276. <p style="margin-left: 40px;">Description: An out-of-bounds write was addressed with improved input validation.</p>
  277. <p style="margin-left: 40px;">CVE-2020-27916: JunDong Xie of Ant Security Light-Year Lab</p>
  278. <p><strong>Audio</strong></p>
  279. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  280. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  281. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  282. iMac Pro (all models)</p>
  283. <p style="margin-left: 40px;">Impact: A malicious application may be able to read restricted memory</p>
  284. <p style="margin-left: 40px;">Description: An out-of-bounds read was addressed with improved bounds checking.</p>
  285. <p style="margin-left: 40px;">CVE-2020-9943: JunDong Xie of Ant Group Light-Year Security Lab</p>
  286. <p><strong>Audio</strong></p>
  287. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  288. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  289. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  290. iMac Pro (all models)</p>
  291. <p style="margin-left: 40px;">Impact: An application may be able to read restricted memory</p>
  292. <p style="margin-left: 40px;">Description: An out-of-bounds read was addressed with improved bounds checking.</p>
  293. <p style="margin-left: 40px;">CVE-2020-9944: JunDong Xie of Ant Group Light-Year Security Lab</p>
  294. <p><strong>Bluetooth</strong></p>
  295. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  296. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  297. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  298. iMac Pro (all models)</p>
  299. <p style="margin-left: 40px;">Impact: A remote attacker may be able to cause unexpected application termination or heap corruption</p>
  300. <p style="margin-left: 40px;">Description: Multiple integer overflows were addressed with improved input validation.</p>
  301. <p style="margin-left: 40px;">CVE-2020-27906: Zuozhi Fan (@pattern_F_) of Ant Group Tianqiong Security Lab</p>
  302. <p><strong>CoreAudio</strong></p>
  303. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  304. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  305. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  306. iMac Pro (all models)</p>
  307. <p style="margin-left: 40px;">Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution</p>
  308. <p style="margin-left: 40px;">Description: An out-of-bounds read was addressed with improved input validation.</p>
  309. <p style="margin-left: 40px;">CVE-2020-27908: JunDong Xie and XingWei Lin of Ant Security Light-Year Lab</p>
  310. <p style="margin-left: 40px;">CVE-2020-27909: Anonymous working with
  311. Trend Micro Zero Day Initiative, JunDong Xie and XingWei Lin of Ant
  312. Security Light-Year Lab</p>
  313. <p style="margin-left: 40px;">CVE-2020-9960: JunDong Xie and XingWei Lin of Ant Security Light-Year Lab</p>
  314. <p style="margin-left: 40px;"><span class="note">Entry added December 14, 2020</span>
  315. </p><p><strong>CoreAudio</strong></p>
  316. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  317. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  318. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  319. iMac Pro (all models)</p>
  320. <p style="margin-left: 40px;">Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution</p>
  321. <p style="margin-left: 40px;">Description: An out-of-bounds write was addressed with improved input validation.</p>
  322. <p style="margin-left: 40px;">CVE-2020-10017: Francis working with Trend Micro Zero Day Initiative, JunDong Xie of Ant Security Light-Year Lab</p>
  323. <p><strong>CoreCapture</strong></p>
  324. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  325. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  326. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  327. iMac Pro (all models)</p>
  328. <p style="margin-left: 40px;">Impact: An application may be able to execute arbitrary code with kernel privileges</p>
  329. <p style="margin-left: 40px;">Description: A use after free issue was addressed with improved memory management.</p>
  330. <p style="margin-left: 40px;">CVE-2020-9949: Proteas</p>
  331. <p><strong>CoreGraphics</strong></p>
  332. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  333. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  334. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  335. iMac Pro (all models)</p>
  336. <p style="margin-left: 40px;">Impact: Processing a maliciously crafted image may lead to arbitrary code execution</p>
  337. <p style="margin-left: 40px;">Description: An out-of-bounds write was addressed with improved input validation.</p>
  338. <p style="margin-left: 40px;">CVE-2020-9883: an anonymous researcher, Mickey Jin of Trend Micro</p>
  339. <p><strong>Crash Reporter</strong></p>
  340. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  341. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  342. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  343. iMac Pro (all models)</p>
  344. <p style="margin-left: 40px;">Impact: A local attacker may be able to elevate &nbsp;their privileges</p>
  345. <p style="margin-left: 40px;">Description: An issue existed within the
  346. path validation logic for symlinks. This issue was addressed with
  347. improved path sanitization.</p>
  348. <p style="margin-left: 40px;">CVE-2020-10003: Tim Michaud (@TimGMichaud) of Leviathan</p>
  349. <p><strong>CoreText</strong></p>
  350. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  351. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  352. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  353. iMac Pro (all models)</p>
  354. <p style="margin-left: 40px;">Impact: Processing a maliciously crafted font file may lead to arbitrary code execution</p>
  355. <p style="margin-left: 40px;">Description: A logic issue was addressed with improved state management.</p>
  356. <p style="margin-left: 40px;">CVE-2020-27922: Mickey Jin of Trend Micro</p>
  357. <p style="margin-left: 40px;"><span class="note">Entry added December 14, 2020</span>
  358. </p><p><strong>CoreText</strong></p>
  359. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  360. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  361. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  362. iMac Pro (all models)</p>
  363. <p style="margin-left: 40px;">Impact: Processing a maliciously crafted text file may lead to arbitrary code execution</p>
  364. <p style="margin-left: 40px;">Description: A memory corruption issue was addressed with improved state management.</p>
  365. <p style="margin-left: 40px;">CVE-2020-9999: Apple</p>
  366. <p style="margin-left: 40px;"><span class="note">Entry updated December 14, 2020</span>
  367. </p><p><strong>Disk Images</strong></p>
  368. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  369. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  370. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  371. iMac Pro (all models)</p>
  372. <p style="margin-left: 40px;">Impact: An application may be able to execute arbitrary code with kernel privileges</p>
  373. <p style="margin-left: 40px;">Description: An out-of-bounds read was addressed with improved input validation.</p>
  374. <p style="margin-left: 40px;">CVE-2020-9965: Proteas</p>
  375. <p style="margin-left: 40px;">CVE-2020-9966: Proteas</p>
  376. <p><strong>Finder</strong></p>
  377. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  378. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  379. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  380. iMac Pro (all models)</p>
  381. <p style="margin-left: 40px;">Impact: Users may be unable to remove metadata indicating where files were downloaded from</p>
  382. <p style="margin-left: 40px;">Description: The issue was addressed with additional user controls.</p>
  383. <p style="margin-left: 40px;">CVE-2020-27894: Manuel Trezza of Shuggr (shuggr.com)</p>
  384. <p><strong>FontParser</strong></p>
  385. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  386. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  387. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  388. iMac Pro (all models)</p>
  389. <p style="margin-left: 40px;">Impact: Processing a maliciously crafted image may lead to arbitrary code execution</p>
  390. <p style="margin-left: 40px;">Description: A buffer overflow was addressed with improved size validation.</p>
  391. <p style="margin-left: 40px;">CVE-2020-9962: Yiğit Can YILMAZ (@yilmazcanyigit)</p>
  392. <p style="margin-left: 40px;"><span class="note">Entry added December 14, 2020</span>
  393. </p><p><strong>FontParser</strong></p>
  394. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  395. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  396. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  397. iMac Pro (all models)</p>
  398. <p style="margin-left: 40px;">Impact: Processing a maliciously crafted font file may lead to arbitrary code execution</p>
  399. <p style="margin-left: 40px;">Description: An out-of-bounds write was addressed with improved input validation.</p>
  400. <p style="margin-left: 40px;">CVE-2020-27952: an anonymous researcher, Mickey Jin and Junzhi Lu of Trend Micro</p>
  401. <p style="margin-left: 40px;"><span class="note">Entry added December 14, 2020</span>
  402. </p><p><strong>FontParser</strong></p>
  403. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  404. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  405. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  406. iMac Pro (all models)</p>
  407. <p style="margin-left: 40px;">Impact: Processing a maliciously crafted font file may lead to arbitrary code execution</p>
  408. <p style="margin-left: 40px;">Description: An out-of-bounds read was addressed with improved input validation.</p>
  409. <p style="margin-left: 40px;">CVE-2020-9956: Mickey Jin and Junzhi Lu of
  410. Trend Micro Mobile Security Research Team working with Trend Micro’s
  411. Zero Day Initiative</p>
  412. <p style="margin-left: 40px;"><span class="note">Entry added December 14, 2020</span>
  413. </p><p><strong>FontParser</strong></p>
  414. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  415. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  416. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  417. iMac Pro (all models)</p>
  418. <p style="margin-left: 40px;">Impact: Processing a maliciously crafted font file may lead to arbitrary code execution</p>
  419. <p style="margin-left: 40px;">Description: A memory corruption issue
  420. existed in the processing of font files. This issue was addressed with
  421. improved input validation.</p>
  422. <p style="margin-left: 40px;">CVE-2020-27931: Apple</p>
  423. <p style="margin-left: 40px;"><span class="note">Entry added December 14, 2020</span>
  424. </p><p><strong>FontParser</strong></p>
  425. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  426. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  427. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  428. iMac Pro (all models)</p>
  429. <p style="margin-left: 40px;">Impact: Processing a maliciously crafted
  430. font may lead to arbitrary code execution.&nbsp;Apple is aware of
  431. reports that an exploit for this issue exists in the wild.</p>
  432. <p style="margin-left: 40px;">Description: A memory corruption issue was addressed with improved input validation.</p>
  433. <p style="margin-left: 40px;">CVE-2020-27930: Google Project Zero</p>
  434. <p><strong>FontParser</strong></p>
  435. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  436. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  437. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  438. iMac Pro (all models)</p>
  439. <p style="margin-left: 40px;">Impact: Processing a maliciously crafted font file may lead to arbitrary code execution</p>
  440. <p style="margin-left: 40px;">Description: An out-of-bounds write issue was addressed with improved bounds checking.</p>
  441. <p style="margin-left: 40px;">CVE-2020-27927: Xingwei Lin of Ant Security Light-Year Lab</p>
  442. <p><strong>Foundation</strong></p>
  443. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  444. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  445. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  446. iMac Pro (all models)</p>
  447. <p style="margin-left: 40px;">Impact: A local user may be able to read arbitrary files</p>
  448. <p style="margin-left: 40px;">Description: A logic issue was addressed with improved state management.</p>
  449. <p style="margin-left: 40px;">CVE-2020-10002: James Hutchins</p>
  450. <p><strong>HomeKit</strong></p>
  451. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  452. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  453. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  454. iMac Pro (all models)</p>
  455. <p style="margin-left: 40px;">Impact: An attacker in a privileged network position may be able to unexpectedly alter application state</p>
  456. <p style="margin-left: 40px;">Description: This issue was addressed with improved setting propagation.</p>
  457. <p style="margin-left: 40px;">CVE-2020-9978: Luyi Xing, Dongfang Zhao,
  458. and Xiaofeng Wang of Indiana University Bloomington, Yan Jia of Xidian
  459. University and University of Chinese Academy of Sciences, and Bin Yuan
  460. of HuaZhong University of Science and Technology</p>
  461. <p style="margin-left: 40px;"><span class="note">Entry added December 14, 2020</span>
  462. </p><p><strong>ImageIO</strong></p>
  463. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  464. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  465. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  466. iMac Pro (all models)</p>
  467. <p style="margin-left: 40px;">Impact: Processing a maliciously crafted image may lead to arbitrary code execution</p>
  468. <p style="margin-left: 40px;">Description: An out-of-bounds write issue was addressed with improved bounds checking.</p>
  469. <p style="margin-left: 40px;">CVE-2020-9955: Mickey Jin of Trend Micro, Xingwei Lin of Ant Security Light-Year Lab</p>
  470. <p style="margin-left: 40px;"><span class="note">Entry added December 14, 2020</span>
  471. </p><p><strong>ImageIO</strong></p>
  472. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  473. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  474. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  475. iMac Pro (all models)</p>
  476. <p style="margin-left: 40px;">Impact: Processing a maliciously crafted image may lead to arbitrary code execution</p>
  477. <p style="margin-left: 40px;">Description: An out-of-bounds read was addressed with improved input validation.</p>
  478. <p style="margin-left: 40px;">CVE-2020-27924: Lei Sun</p>
  479. <p style="margin-left: 40px;"><span class="note">Entry added December 14, 2020</span>
  480. </p><p><strong>ImageIO</strong></p>
  481. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  482. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  483. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  484. iMac Pro (all models)</p>
  485. <p style="margin-left: 40px;">Impact: Processing a maliciously crafted image may lead to arbitrary code execution</p>
  486. <p style="margin-left: 40px;">Description: An out-of-bounds write was addressed with improved input validation.</p>
  487. <p style="margin-left: 40px;">CVE-2020-27912: Xingwei Lin of Ant Security Light-Year Lab</p>
  488. <p style="margin-left: 40px;">CVE-2020-27923: Lei Sun</p>
  489. <p style="margin-left: 40px;"><span class="note">Entry updated December 14, 2020</span>
  490. </p><p><strong>ImageIO</strong></p>
  491. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  492. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  493. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  494. iMac Pro (all models)</p>
  495. <p style="margin-left: 40px;">Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution</p>
  496. <p style="margin-left: 40px;">Description: An out-of-bounds write issue was addressed with improved bounds checking.</p>
  497. <p style="margin-left: 40px;">CVE-2020-9876: Mickey Jin of Trend Micro</p>
  498. <p><strong>Intel Graphics Driver</strong></p>
  499. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  500. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  501. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  502. iMac Pro (all models)</p>
  503. <p style="margin-left: 40px;">Impact: An application may be able to execute arbitrary code with kernel privileges</p>
  504. <p style="margin-left: 40px;">Description: An out-of-bounds write issue was addressed with improved bounds checking.</p>
  505. <p style="margin-left: 40px;">CVE-2020-10015: ABC Research s.r.o. working with Trend Micro Zero Day Initiative</p>
  506. <p style="margin-left: 40px;">CVE-2020-27897: Xiaolong Bai and Min (Spark) Zheng of Alibaba Inc., and Luyi Xing of Indiana University Bloomington</p>
  507. <p style="margin-left: 40px;"><span class="note">Entry added December 14, 2020</span>
  508. </p><p><strong>Intel Graphics Driver</strong></p>
  509. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  510. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  511. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  512. iMac Pro (all models)</p>
  513. <p style="margin-left: 40px;">Impact: An application may be able to execute arbitrary code with kernel privileges</p>
  514. <p style="margin-left: 40px;">Description: A memory corruption issue was addressed with improved memory handling.</p>
  515. <p style="margin-left: 40px;">CVE-2020-27907: ABC Research s.r.o. working with Trend Micro Zero Day Initiative</p>
  516. <p style="margin-left: 40px;"><span class="note">Entry added December 14, 2020</span>
  517. </p><p><strong>Image Processing</strong></p>
  518. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  519. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  520. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  521. iMac Pro (all models)</p>
  522. <p style="margin-left: 40px;">Impact: Processing a maliciously crafted image may lead to arbitrary code execution</p>
  523. <p style="margin-left: 40px;">Description: An out-of-bounds write was addressed with improved input validation.</p>
  524. <p style="margin-left: 40px;">CVE-2020-27919: Hou JingYi (@hjy79425575) of Qihoo 360 CERT, Xingwei Lin of Ant Security Light-Year Lab</p>
  525. <p style="margin-left: 40px;"><span class="note">Entry added December 14, 2020</span>
  526. </p><p><strong>Kernel</strong></p>
  527. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  528. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  529. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  530. iMac Pro (all models)</p>
  531. <p style="margin-left: 40px;">Impact: A remote attacker may be able to cause unexpected system termination or corrupt kernel memory</p>
  532. <p style="margin-left: 40px;">Description: Multiple memory corruption issues were addressed with improved input validation.</p>
  533. <p style="margin-left: 40px;">CVE-2020-9967: Alex Plaskett (@alexjplaskett)</p>
  534. <p style="margin-left: 40px;"><span class="note">Entry added December 14, 2020</span>
  535. </p><p><strong>Kernel</strong></p>
  536. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  537. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  538. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  539. iMac Pro (all models)</p>
  540. <p style="margin-left: 40px;">Impact: An application may be able to execute arbitrary code with kernel privileges</p>
  541. <p style="margin-left: 40px;">Description: A use after free issue was addressed with improved memory management.</p>
  542. <p style="margin-left: 40px;">CVE-2020-9975: Tielei Wang of Pangu Lab</p>
  543. <p style="margin-left: 40px;"><span class="note">Entry added December 14, 2020</span>
  544. </p><p><strong>Kernel</strong></p>
  545. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  546. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  547. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  548. iMac Pro (all models)</p>
  549. <p style="margin-left: 40px;">Impact: An application may be able to execute arbitrary code with kernel privileges</p>
  550. <p style="margin-left: 40px;">Description: A race condition was addressed with improved state handling.</p>
  551. <p style="margin-left: 40px;">CVE-2020-27921: Linus Henze (pinauten.de)</p>
  552. <p style="margin-left: 40px;"><span class="note">Entry added December 14, 2020</span>
  553. </p><p><strong>Kernel</strong></p>
  554. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  555. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  556. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  557. iMac Pro (all models)</p>
  558. <p style="margin-left: 40px;">Impact: An application may be able to execute arbitrary code with kernel privileges</p>
  559. <p style="margin-left: 40px;">Description: A logic issue existed resulting in memory corruption. This was addressed with improved state management.</p>
  560. <p style="margin-left: 40px;">CVE-2020-27904: Zuozhi Fan (@pattern_F_) of Ant Group Tianqong Security Lab</p>
  561. <p><strong>Kernel</strong></p>
  562. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  563. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  564. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  565. iMac Pro (all models)</p>
  566. <p style="margin-left: 40px;">Impact: An attacker in a privileged network position may be able to inject into active connections within a VPN tunnel</p>
  567. <p style="margin-left: 40px;">Description: A routing issue was addressed with improved restrictions.</p>
  568. <p style="margin-left: 40px;">CVE-2019-14899: William J. Tolley, Beau Kujath, and Jedidiah R. Crandall</p>
  569. <p><strong>Kernel</strong></p>
  570. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  571. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  572. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  573. iMac Pro (all models)</p>
  574. <p style="margin-left: 40px;">Impact: A malicious application may be
  575. able to disclose kernel memory.&nbsp;Apple is aware of reports that an
  576. exploit for this issue exists in the wild.</p>
  577. <p style="margin-left: 40px;">Description: A memory initialization issue was addressed.</p>
  578. <p style="margin-left: 40px;">CVE-2020-27950: Google Project Zero</p>
  579. <p><strong>Kernel</strong></p>
  580. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  581. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  582. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  583. iMac Pro (all models)</p>
  584. <p style="margin-left: 40px;">Impact: A malicious application may be able to determine kernel memory layout</p>
  585. <p style="margin-left: 40px;">Description: A logic issue was addressed with improved state management.</p>
  586. <p style="margin-left: 40px;">CVE-2020-9974: Tommy Muir (@Muirey03)</p>
  587. <p><strong>Kernel</strong></p>
  588. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  589. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  590. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  591. iMac Pro (all models)</p>
  592. <p style="margin-left: 40px;">Impact: An application may be able to execute arbitrary code with kernel privileges</p>
  593. <p style="margin-left: 40px;">Description: A memory corruption issue was addressed with improved state management.</p>
  594. <p style="margin-left: 40px;">CVE-2020-10016: Alex Helie</p>
  595. <p><strong>Kernel</strong></p>
  596. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  597. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  598. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  599. iMac Pro (all models)</p>
  600. <p style="margin-left: 40px;">Impact: A malicious application may be
  601. able to execute arbitrary code with kernel privileges.&nbsp;Apple is
  602. aware of reports that an exploit for this issue exists in the wild.</p>
  603. <p style="margin-left: 40px;">Description: A type confusion issue was addressed with improved state handling.</p>
  604. <p style="margin-left: 40px;">CVE-2020-27932: Google Project Zero</p>
  605. <p><strong>libxml2</strong></p>
  606. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  607. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  608. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  609. iMac Pro (all models)</p>
  610. <p style="margin-left: 40px;">Impact: Processing maliciously crafted web content may lead to code execution</p>
  611. <p style="margin-left: 40px;">Description: A use after free issue was addressed with improved memory management.</p>
  612. <p style="margin-left: 40px;">CVE-2020-27917: found by OSS-Fuzz</p>
  613. <p style="margin-left: 40px;">CVE-2020-27920: found by OSS-Fuzz</p>
  614. <p style="margin-left: 40px;"><span class="note">Entry updated December 14, 2020</span>
  615. </p><p><strong>libxml2</strong></p>
  616. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  617. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  618. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  619. iMac Pro (all models)</p>
  620. <p style="margin-left: 40px;">Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code execution</p>
  621. <p style="margin-left: 40px;">Description: An integer overflow was addressed through improved input validation.</p>
  622. <p style="margin-left: 40px;">CVE-2020-27911: found by OSS-Fuzz</p>
  623. <p><strong>libxpc</strong></p>
  624. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  625. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  626. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  627. iMac Pro (all models)</p>
  628. <p style="margin-left: 40px;">Impact: A malicious application may be able to elevate privileges</p>
  629. <p style="margin-left: 40px;">Description: A logic issue was addressed with improved validation.</p>
  630. <p style="margin-left: 40px;">CVE-2020-9971: Zhipeng Huo (@R3dF09) of Tencent Security Xuanwu Lab</p>
  631. <p style="margin-left: 40px;"><span class="note">Entry added December 14, 2020</span>
  632. </p><p><strong>libxpc</strong></p>
  633. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  634. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  635. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  636. iMac Pro (all models)</p>
  637. <p style="margin-left: 40px;">Impact: A malicious application may be able to break out of its sandbox</p>
  638. <p style="margin-left: 40px;">Description: A parsing issue in the handling of directory paths was addressed with improved path validation.</p>
  639. <p style="margin-left: 40px;">CVE-2020-10014: Zhipeng Huo (@R3dF09) of Tencent Security Xuanwu Lab</p>
  640. <p><strong>Logging</strong></p>
  641. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  642. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  643. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  644. iMac Pro (all models)</p>
  645. <p style="margin-left: 40px;">Impact: A local attacker may be able to elevate their privileges</p>
  646. <p style="margin-left: 40px;">Description: A path handling issue was addressed with improved validation.</p>
  647. <p style="margin-left: 40px;">CVE-2020-10010: Tommy Muir (@Muirey03)</p>
  648. <p><strong>Mail</strong></p>
  649. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  650. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  651. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  652. iMac Pro (all models)</p>
  653. <p style="margin-left: 40px;">Impact: A remote attacker may be able to unexpectedly alter application state</p>
  654. <p style="margin-left: 40px;">Description: This issue was addressed with improved checks.</p>
  655. <p style="margin-left: 40px;">CVE-2020-9941: Fabian Ising of FH Münster
  656. University of Applied Sciences and Damian Poddebniak of FH Münster
  657. University of Applied Sciences</p>
  658. <p><strong>Messages</strong></p>
  659. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  660. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  661. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  662. iMac Pro (all models)</p>
  663. <p style="margin-left: 40px;">Impact: A local user may be able to discover a user’s deleted messages</p>
  664. <p style="margin-left: 40px;">Description: The issue was addressed with improved deletion.</p>
  665. <p style="margin-left: 40px;">CVE-2020-9988: William Breuer of the Netherlands</p>
  666. <p style="margin-left: 40px;">CVE-2020-9989: von Brunn Media</p>
  667. <p><strong>Model I/O</strong></p>
  668. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  669. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  670. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  671. iMac Pro (all models)</p>
  672. <p style="margin-left: 40px;">Impact: Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution</p>
  673. <p style="margin-left: 40px;">Description: An out-of-bounds read was addressed with improved bounds checking.</p>
  674. <p style="margin-left: 40px;">CVE-2020-10011: Aleksandar Nikolic of Cisco Talos</p>
  675. <p style="margin-left: 40px;"><span class="note">Entry added December 14, 2020</span>
  676. </p><p><strong>Model I/O</strong></p>
  677. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  678. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  679. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  680. iMac Pro (all models)</p>
  681. <p style="margin-left: 40px;">Impact: Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution</p>
  682. <p style="margin-left: 40px;">Description: An out-of-bounds read was addressed with improved input validation.</p>
  683. <p style="margin-left: 40px;">CVE-2020-13524: Aleksandar Nikolic of Cisco Talos</p>
  684. <p><strong>Model I/O</strong></p>
  685. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  686. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  687. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  688. iMac Pro (all models)</p>
  689. <p style="margin-left: 40px;">Impact: Opening a maliciously crafted file may lead to unexpected application termination or arbitrary code execution</p>
  690. <p style="margin-left: 40px;">Description: A logic issue was addressed with improved state management.</p>
  691. <p style="margin-left: 40px;">CVE-2020-10004: Aleksandar Nikolic of Cisco Talos</p>
  692. <p><strong>NetworkExtension</strong></p>
  693. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  694. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  695. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  696. iMac Pro (all models)</p>
  697. <p style="margin-left: 40px;">Impact: A malicious application may be able to elevate privileges</p>
  698. <p style="margin-left: 40px;">Description: A use after free issue was addressed with improved memory management.</p>
  699. <p style="margin-left: 40px;">CVE-2020-9996: Zhiwei Yuan of Trend Micro iCore Team, Junzhi Lu and Mickey Jin of Trend Micro</p>
  700. <p><strong>NSRemoteView</strong></p>
  701. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  702. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  703. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  704. iMac Pro (all models)</p>
  705. <p style="margin-left: 40px;">Impact: A sandboxed process may be able to circumvent sandbox restrictions</p>
  706. <p style="margin-left: 40px;">Description: A logic issue was addressed with improved restrictions.</p>
  707. <p style="margin-left: 40px;">CVE-2020-27901: Thijs Alkemade of Computest Research Division</p>
  708. <p style="margin-left: 40px;"><span class="note">Entry added December 14, 2020</span>
  709. </p><p><strong>NSRemoteView</strong></p>
  710. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  711. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  712. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  713. iMac Pro (all models)</p>
  714. <p style="margin-left: 40px;">Impact: A malicious application may be able to preview files it does not have access to</p>
  715. <p style="margin-left: 40px;">Description: An issue existed in the handling of snapshots. The issue was resolved with improved permissions logic.</p>
  716. <p style="margin-left: 40px;">CVE-2020-27900: Thijs Alkemade of Computest Research Division</p>
  717. <p><strong>PCRE</strong></p>
  718. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  719. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  720. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  721. iMac Pro (all models)</p>
  722. <p style="margin-left: 40px;">Impact: Multiple issues in pcre</p>
  723. <p style="margin-left: 40px;">Description: Multiple issues were addressed by updating to version 8.44.</p>
  724. <p style="margin-left: 40px;">CVE-2019-20838</p>
  725. <p style="margin-left: 40px;">CVE-2020-14155</p>
  726. <p><strong>Power Management</strong></p>
  727. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  728. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  729. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  730. iMac Pro (all models)</p>
  731. <p style="margin-left: 40px;">Impact: A malicious application may be able to determine kernel memory layout</p>
  732. <p style="margin-left: 40px;">Description: A logic issue was addressed with improved state management.</p>
  733. <p style="margin-left: 40px;">CVE-2020-10007: singi@theori working with Trend Micro Zero Day Initiative</p>
  734. <p><strong>python</strong></p>
  735. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  736. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  737. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  738. iMac Pro (all models)</p>
  739. <p style="margin-left: 40px;">Impact: Cookies belonging to one origin may be sent to another origin</p>
  740. <p style="margin-left: 40px;">Description: Multiple issues were addressed with improved logic.</p>
  741. <p style="margin-left: 40px;">CVE-2020-27896: an anonymous researcher</p>
  742. <p><strong>Quick Look</strong></p>
  743. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  744. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  745. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  746. iMac Pro (all models)</p>
  747. <p style="margin-left: 40px;">Impact: A malicious app may be able to determine the existence of files on the computer</p>
  748. <p style="margin-left: 40px;">Description: The issue was addressed with improved handling of icon caches.</p>
  749. <p style="margin-left: 40px;">CVE-2020-9963: Csaba Fitzl (@theevilbit) of Offensive Security</p>
  750. <p><strong>Quick Look</strong></p>
  751. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  752. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  753. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  754. iMac Pro (all models)</p>
  755. <p style="margin-left: 40px;">Impact: Processing a maliciously crafted document may lead to a cross site scripting attack</p>
  756. <p style="margin-left: 40px;">Description: An access issue was addressed with improved access restrictions.</p>
  757. <p style="margin-left: 40px;">CVE-2020-10012: Heige of KnownSec 404 Team
  758. (https://www.knownsec.com/) and Bo Qu of Palo Alto Networks
  759. (https://www.paloaltonetworks.com/)</p>
  760. <p><strong>Ruby</strong></p>
  761. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  762. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  763. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  764. iMac Pro (all models)</p>
  765. <p style="margin-left: 40px;">Impact: A remote attacker may be able to modify the file system</p>
  766. <p style="margin-left: 40px;">Description: A path handling issue was addressed with improved validation.</p>
  767. <p style="margin-left: 40px;">CVE-2020-27896: an anonymous researcher</p>
  768. <p><strong>Ruby</strong></p>
  769. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  770. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  771. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  772. iMac Pro (all models)</p>
  773. <p style="margin-left: 40px;">Impact: When parsing certain JSON documents, the json gem can be coerced into creating arbitrary objects in the target system</p>
  774. <p style="margin-left: 40px;">Description: This issue was addressed with improved checks.</p>
  775. <p style="margin-left: 40px;">CVE-2020-10663: Jeremy Evans</p>
  776. <p><strong>Safari</strong></p>
  777. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  778. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  779. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  780. iMac Pro (all models)</p>
  781. <p style="margin-left: 40px;">Impact: Visiting a malicious website may lead to address bar spoofing</p>
  782. <p style="margin-left: 40px;">Description: A spoofing issue existed in the handling of URLs. This issue was addressed with improved input validation.</p>
  783. <p style="margin-left: 40px;">CVE-2020-9945: Narendra Bhati From Suma Soft Pvt. Ltd. Pune (India) @imnarendrabhati</p>
  784. <p><strong>Safari</strong></p>
  785. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  786. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  787. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  788. iMac Pro (all models)</p>
  789. <p style="margin-left: 40px;">Impact: A malicious application may be able to determine a user's open tabs in Safari</p>
  790. <p style="margin-left: 40px;">Description: A validation issue existed in
  791. the entitlement verification. This issue was addressed with improved
  792. validation of the process entitlement.</p>
  793. <p style="margin-left: 40px;">CVE-2020-9977: Josh Parnham (@joshparnham)</p>
  794. <p><strong>Safari</strong></p>
  795. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  796. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  797. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  798. iMac Pro (all models)</p>
  799. <p style="margin-left: 40px;">Impact: Visiting a malicious website may lead to address bar spoofing</p>
  800. <p style="margin-left: 40px;">Description: An inconsistent user interface issue was addressed with improved state management.</p>
  801. <p style="margin-left: 40px;">CVE-2020-9942: an anonymous researcher,
  802. Rahul d Kankrale (servicenger.com), Rayyan Bijoora (@Bijoora) of The
  803. City School, PAF Chapter, Ruilin Yang of Tencent Security Xuanwu Lab,
  804. YoKo Kho (@YoKoAcc) of PT Telekomunikasi Indonesia (Persero) Tbk,
  805. Zhiyang Zeng(@Wester) of OPPO ZIWU Security Lab</p>
  806. <p><strong>Sandbox</strong></p>
  807. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  808. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  809. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  810. iMac Pro (all models)</p>
  811. <p style="margin-left: 40px;">Impact: A local user may be able to view senstive user information</p>
  812. <p style="margin-left: 40px;">Description: An access issue was addressed with additional sandbox restrictions.</p>
  813. <p style="margin-left: 40px;">CVE-2020-9969: Wojciech Reguła of SecuRing (wojciechregula.blog)</p>
  814. <p><strong>SQLite</strong></p>
  815. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  816. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  817. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  818. iMac Pro (all models)</p>
  819. <p style="margin-left: 40px;">Impact: A remote attacker may be able to cause a denial of service</p>
  820. <p style="margin-left: 40px;">Description: This issue was addressed with improved checks.</p>
  821. <p style="margin-left: 40px;">CVE-2020-9991</p>
  822. <p><strong>SQLite</strong></p>
  823. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  824. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  825. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  826. iMac Pro (all models)</p>
  827. <p style="margin-left: 40px;">Impact: A remote attacker may be able to leak memory</p>
  828. <p style="margin-left: 40px;">Description: An information disclosure issue was addressed with improved state management.</p>
  829. <p style="margin-left: 40px;">CVE-2020-9849</p>
  830. <p><strong>SQLite</strong></p>
  831. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  832. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  833. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  834. iMac Pro (all models)</p>
  835. <p style="margin-left: 40px;">Impact: Multiple issues in SQLite</p>
  836. <p style="margin-left: 40px;">Description: Multiple issues were addressed by updating SQLite to version 3.32.3.</p>
  837. <p style="margin-left: 40px;">CVE-2020-15358</p>
  838. <p><strong>SQLite</strong></p>
  839. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  840. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  841. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  842. iMac Pro (all models)</p>
  843. <p style="margin-left: 40px;">Impact: A maliciously crafted SQL query may lead to data corruption</p>
  844. <p style="margin-left: 40px;">Description: This issue was addressed with improved checks.</p>
  845. <p style="margin-left: 40px;">CVE-2020-13631</p>
  846. <p><strong>SQLite</strong></p>
  847. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  848. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  849. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  850. iMac Pro (all models)</p>
  851. <p style="margin-left: 40px;">Impact: A remote attacker may be able to cause a denial of service</p>
  852. <p style="margin-left: 40px;">Description: This issue was addressed with improved checks.</p>
  853. <p style="margin-left: 40px;">CVE-2020-13434</p>
  854. <p style="margin-left: 40px;">CVE-2020-13435</p>
  855. <p style="margin-left: 40px;">CVE-2020-9991</p>
  856. <p><strong>SQLite</strong></p>
  857. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  858. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  859. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  860. iMac Pro (all models)</p>
  861. <p style="margin-left: 40px;">Impact: A remote attacker may be able to cause arbitrary code execution</p>
  862. <p style="margin-left: 40px;">Description: A memory corruption issue was addressed with improved state management.</p>
  863. <p style="margin-left: 40px;">CVE-2020-13630</p>
  864. <p><strong>Symptom Framework</strong></p>
  865. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  866. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  867. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  868. iMac Pro (all models)</p>
  869. <p style="margin-left: 40px;">Impact: A local attacker may be able to elevate their privileges</p>
  870. <p style="margin-left: 40px;">Description: A use after free issue was addressed with improved memory management.</p>
  871. <p style="margin-left: 40px;">CVE-2020-27899: 08Tc3wBB working with ZecOps</p>
  872. <p style="margin-left: 40px;"><span class="note">Entry added December 14, 2020</span>
  873. </p><p><strong>System Preferences</strong></p>
  874. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  875. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  876. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  877. iMac Pro (all models)</p>
  878. <p style="margin-left: 40px;">Impact: A sandboxed process may be able to circumvent sandbox restrictions</p>
  879. <p style="margin-left: 40px;">Description: A logic issue was addressed with improved state management.</p>
  880. <p style="margin-left: 40px;">CVE-2020-10009: Thijs Alkemade of Computest Research Division</p>
  881. <p><strong>TCC</strong></p>
  882. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  883. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  884. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  885. iMac Pro (all models)</p>
  886. <p style="margin-left: 40px;">Impact: A malicious application with root privileges may be able to access private information</p>
  887. <p style="margin-left: 40px;">Description: A logic issue was addressed with improved restrictions.</p>
  888. <p style="margin-left: 40px;">CVE-2020-10008: Wojciech Reguła of SecuRing (wojciechregula.blog)</p>
  889. <p style="margin-left: 40px;"><span class="note">Entry added December 14, 2020</span>
  890. </p><p><strong>WebKit</strong></p>
  891. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  892. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  893. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  894. iMac Pro (all models)</p>
  895. <p style="margin-left: 40px;">Impact: Processing maliciously crafted web content may lead to arbitrary code execution</p>
  896. <p style="margin-left: 40px;">Description: A use after free issue was addressed with improved memory management.</p>
  897. <p style="margin-left: 40px;">CVE-2020-27918: Liu Long of Ant Security Light-Year Lab</p>
  898. <p style="margin-left: 40px;"><span class="note">Entry updated December 14, 2020</span>
  899. </p><p><strong>Wi-Fi</strong></p>
  900. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  901. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  902. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  903. iMac Pro (all models)</p>
  904. <p style="margin-left: 40px;">Impact: An attacker may be able to bypass Managed Frame Protection</p>
  905. <p style="margin-left: 40px;">Description: A denial of service issue was addressed with improved state handling.</p>
  906. <p style="margin-left: 40px;">CVE-2020-27898: Stephan Marais of University of Johannesburg</p>
  907. <p><strong>XNU</strong></p>
  908. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  909. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  910. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  911. iMac Pro (all models)</p>
  912. <p style="margin-left: 40px;">Impact: A sandboxed process may be able to circumvent sandbox restrictions</p>
  913. <p style="margin-left: 40px;">Description: Multiple issues were addressed with improved logic.</p>
  914. <p style="margin-left: 40px;">CVE-2020-27935: Lior Halphon (@LIJI32)</p>
  915. <p style="margin-left: 40px;"><span class="note">Entry added December 17, 2020</span>
  916. </p><p><strong>Xsan</strong></p>
  917. <p style="margin-left: 40px;">Available for: Mac Pro (2013 and later),
  918. MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac
  919. mini (2014 and later), iMac (2014 and later), MacBook (2015 and later),
  920. iMac Pro (all models)</p>
  921. <p style="margin-left: 40px;">Impact: A malicious application may be able to access restricted files</p>
  922. <p style="margin-left: 40px;">Description: This issue was addressed with improved entitlements.</p>
  923. <p style="margin-left: 40px;">CVE-2020-10006: Wojciech Reguła (@_r3ggi) of SecuRing</p>
  924. </div>
  925. </div>
  926. <div>
  927. <div><p><img alt="" src="About%20the%20security%20content%20of%20macOS%20Big%20Sur%2011.0.1%20-%20Apple%20Support_files/divider.png"></p>
  928. </div>
  929. </div>
  930. <div>
  931. <h2>Additional recognition</h2>
  932. <div><p><strong>802.1X</strong></p>
  933. <p style="margin-left: 40px;">We would like to acknowledge Kenana Dalle
  934. of Hamad bin Khalifa University and Ryan Riley of Carnegie Mellon
  935. University in Qatar for their assistance.</p>
  936. <p style="margin-left: 40px;"><span class="note">Entry added December 14, 2020</span>
  937. </p><p><strong>Audio</strong></p>
  938. <p style="margin-left: 40px;">We would like to acknowledge JunDong Xie
  939. and XingWei Lin of Ant-financial Light-Year Security Lab, an anonymous
  940. researcher for their assistance.</p>
  941. <p><strong>Bluetooth</strong></p>
  942. <p style="margin-left: 40px;">We would like to acknowledge Andy Davis of
  943. NCC Group, Dennis Heinze (@ttdennis) of TU Darmstadt, Secure Mobile
  944. Networking Lab for their assistance.</p>
  945. <p style="margin-left: 40px;"><span class="note">Entry updated December 14, 2020</span>
  946. </p><p><strong>Clang</strong></p>
  947. <p style="margin-left: 40px;">We would like to acknowledge Brandon Azad of Google Project Zero for their assistance.</p>
  948. <p><strong>Core Location</strong></p>
  949. <p style="margin-left: 40px;">We would like to acknowledge Yiğit Can YILMAZ (@yilmazcanyigit) for their assistance.</p>
  950. <p><strong>Crash Reporter</strong></p>
  951. <p style="margin-left: 40px;">We would like to acknowledge Artur Byszko of AFINE for their assistance.</p>
  952. <p style="margin-left: 40px;"><span class="note">Entry added December 14, 2020</span>
  953. </p><p><strong>Directory Utility</strong></p>
  954. <p style="margin-left: 40px;">We would like to acknowledge Wojciech Reguła (@_r3ggi) of SecuRing for their assistance.</p>
  955. <p><strong>iAP</strong></p>
  956. <p style="margin-left: 40px;">We would like to acknowledge Andy Davis of NCC Group for their assistance.</p>
  957. <p><strong>Kernel</strong></p>
  958. <p style="margin-left: 40px;">We would like to acknowledge Brandon Azad of Google Project Zero, Stephen Röttger of Google for their assistance.</p>
  959. <p><strong>libxml2</strong></p>
  960. <p style="margin-left: 40px;">We would like to acknowledge an anonymous researcher for their assistance.</p>
  961. <p style="margin-left: 40px;"><span class="note">Entry added December 14, 2020</span>
  962. </p><p><strong>Login Window</strong></p>
  963. <p style="margin-left: 40px;">We would like to acknowledge Rob Morton of Leidos for their assistance.</p>
  964. <p><strong>Photos Storage</strong></p>
  965. <p style="margin-left: 40px;">We would like to acknowledge Paulos Yibelo of LimeHats for their assistance.</p>
  966. <p><strong>Quick Look</strong></p>
  967. <p style="margin-left: 40px;">We would like to acknowledge Csaba Fitzl
  968. (@theevilbit) and Wojciech Reguła of SecuRing (wojciechregula.blog) for
  969. their assistance.</p>
  970. <p><strong>Safari</strong></p>
  971. <p style="margin-left: 40px;">We would like to acknowledge Gabriel
  972. Corona and Narendra Bhati From Suma Soft Pvt. Ltd. Pune (India)
  973. @imnarendrabhati for their assistance.</p>
  974. <p><strong>Security</strong></p>
  975. <p style="margin-left: 40px;">We would like to acknowledge Christian Starkjohann of Objective Development Software GmbH for their assistance.</p>
  976. <p><strong>System Preferences</strong></p>
  977. <p style="margin-left: 40px;">We would like to acknowledge Csaba Fitzl (@theevilbit) of Offensive Security for their assistance.</p>
  978. </div>
  979. </div>
  980. </div>
  981. <div class="sosumi"><p>Information
  982. about products not manufactured by Apple, or independent websites not
  983. controlled or tested by Apple, is provided without recommendation or
  984. endorsement. Apple assumes no responsibility with regard to the
  985. selection, performance, or use of third-party websites or products.
  986. Apple makes no representations regarding third-party website accuracy or
  987. reliability. <a href="http://support.apple.com/kb/HT2693">Contact the vendor</a> for additional information.</p>
  988. </div>
  989. <div class="mod-date">
  990. <span>Published Date:</span>&nbsp;<time datetime="2020-12-17" itemprop="datePublished">December 17, 2020</time>
  991. </div>
  992. </div>
  993. </div>
  994. </div>
  995. </div>
  996. </section>
  997. </div>
  998. </div>
  999. <div id="helpful-rating-wrapper">
  1000. <div id="helpful" class="ratings">
  1001. <div id="question-state" class="show">
  1002. <fieldset>
  1003. <legend>
  1004. <div id="okapi-a">
  1005. <span>Helpful?</span>
  1006. </div>
  1007. </legend>
  1008. <div class="helpful-btn-grp">
  1009. <button class="button" id="yes-button" data-ss-analytics-link-component_name="helpful" data-ss-analytics-link-component_type="helpful" data-ss-analytics-link-text="yes" data-ss-analytics-event="acs.link_click" title="Solved my problem">
  1010. Yes
  1011. </button>
  1012. <button class="button" id="no-button" data-ss-analytics-link-component_name="helpful" data-ss-analytics-link-component_type="helpful" data-ss-analytics-link-text="no" data-ss-analytics-event="acs.link_click" title="Not helpful">
  1013. No
  1014. </button>
  1015. </div>
  1016. </fieldset>
  1017. </div>
  1018. <div id="feedback-state" class="form-element form-textbox-labelbelow hide">
  1019. <form autocomplete="off">
  1020. <input type="hidden" id="form-counter-error-message" value="Maximum character limit is 250.">
  1021. <label id="feedback-label" htmlfor="feedback" data-no-label="Thanks for letting us know." data-yes-label="We’re glad this article helped."></label>
  1022. <div class="form-element form-textbox-labelbelow" id="feedback">
  1023. <textarea class="form-textbox form-textbox-textarea form-counter-textarea form-textbox-entered" data-no-placeholder="How can we make this article more helpful? (Optional)" data-yes-placeholder="Anything else you’d like us to know? (Optional)" data-max-length="250" aria-labelledby="optional_label" aria-describedby="char_limit_counter"></textarea>
  1024. <div class="form-textarea-paddingcover">
  1025. <div class="form-textarea-paddingcover-color"></div>
  1026. </div>
  1027. <span class="form-label" id="optional_label" aria-hidden="true"></span>
  1028. <div class="form-textbox-counter" id="char_limit_counter">
  1029. <span class="visuallyhidden" id="char-limit-message">Character limit:</span>
  1030. <span class="form-counter">250</span>
  1031. </div>
  1032. <label htmlfor="feedback-note">Please don’t include any personal information in your comment.</label>
  1033. <div class="form-message-wrapper">
  1034. <span class="form-message">Maximum character limit is 250.</span>
  1035. </div>
  1036. <button type="submit" class="button" id="submit-feedback">
  1037. Submit
  1038. </button>
  1039. </div>
  1040. </form>
  1041. </div>
  1042. <div id="rating-done" class="hide">
  1043. Thanks for your feedback.
  1044. </div>
  1045. <div id="results-helpful" class="show">
  1046. </div>
  1047. </div>
  1048. </div>
  1049. <div id="ask-widget-wrapper" class="css-not-downloaded discussions">
  1050. <div id="ask-widget">
  1051. <div class="contentWrapper">
  1052. <div class="sectionHeaderLayout">
  1053. <div class="icon"></div>
  1054. <div class="titleTextLayout">
  1055. <h2 class="title">Start a discussion <span id="discussion-subtitle">in&nbsp;Apple&nbsp;Support&nbsp;Communities</span></h2>
  1056. </div>
  1057. </div>
  1058. <div class="sectionFormInputLayout">
  1059. <form action="https://discussions.apple.com/create/question" id="question-form" method="get" data-ss-analytics-link-component_name="Start a discussion" data-ss-analytics-link-component_type="discussion" data-ss-analytics-link-text="Submit my question" data-ss-analytics-link-url="https://discussions.apple.com/create/question" data-ss-analytics-event="acs.link_click" data-ignore-tracking="true">
  1060. <span class="fieldwrap">
  1061. <label htmlfor="interactiveQuestionSearchField" class="a11y">
  1062. Ask other users about this article
  1063. </label>
  1064. <input type="hidden" id="discussionFormArticleId" name="articleId" value="HT211931">
  1065. <input type="hidden" id="ols_discussion_error_no_question" value="Please enter your question!">
  1066. <div class="form-element">
  1067. <input id="questionInputField" type="text" class="questionInputField form-textbox form-textbox-text" name="title" maxlength="255" aria-labelledby="placeholder-text" aria-invalid="false">
  1068. <span class="form-label" id="placeholder-text" aria-hidden="true">Ask other users about this article</span>
  1069. </div>
  1070. </span>
  1071. <div class="jive-widget-question-div clearfix" id="question-submit">
  1072. <input type="submit" class="questionSubmitFormButton button button-secondary button-compact" value="Submit my question">
  1073. </div>
  1074. <a data-ss-analytics-link-component_name="Start a discussion" data-ss-analytics-link-component_type="discussion" data-ss-analytics-link-text="See all questions on this article" data-ss-analytics-link-url="https://discussions.apple.com/article/HT211931" data-ss-analytics-event="acs.link_click" class="see-all-questions" href="https://discussions.apple.com/article/HT211931">
  1075. See all questions on this article
  1076. <span class="icon icon-chevronright" aria-hidden="true">
  1077. </span></a>
  1078. </form>
  1079. </div>
  1080. </div>
  1081. </div>
  1082. </div>
  1083. <div id="cas">
  1084. <div id="promo" class="one"></div>
  1085. </div>
  1086. <div id="flexbanner-wrapper">
  1087. <div id="flexbanner"></div>
  1088. </div>
  1089. <div class="footer-wrapper">
  1090. <footer id="ac-globalfooter" dir="ltr" class="js no-touch svg no-ie7 no-ie8 footer-global" data-analytics-region="global footer" role="contentinfo" aria-labelledby="ac-gf-label" lang="en-us">
  1091. <div class="ac-gf-content">
  1092. <h2 class="ac-gf-label" id="ac-gf-label">Apple Footer</h2>
  1093. <nav class="ac-gf-breadcrumbs" aria-label="Breadcrumbs" role="navigation">
  1094. <a href="https://www.apple.com/" class="home ac-gf-breadcrumbs-home">
  1095. <span class="ac-gf-breadcrumbs-home-icon" aria-hidden="true"></span>
  1096. <span class="ac-gf-breadcrumbs-home-label">Apple</span>
  1097. <span class="ac-gf-breadcrumbs-home-chevron"></span>
  1098. <span class="ac-gf-breadcrumbs-home-mask"></span>
  1099. </a>
  1100. <div class="ac-gf-breadcrumbs-path">
  1101. <ol class="ac-gf-breadcrumbs-list" vocab="http://schema.org/" typeof="BreadcrumbList">
  1102. <li class="ac-gf-breadcrumbs-item" property="itemListElement" typeof="ListItem">
  1103. <span property="name">
  1104. <a href="https://support.apple.com/">Support</a>
  1105. </span>
  1106. <meta property="position" content="1">
  1107. </li>
  1108. <li class="ac-gf-breadcrumbs-item" property="itemListElement" typeof="ListItem">
  1109. <span property="name">About the security content of macOS Big Sur 11.0.1</span>
  1110. <meta property="position" content="2">
  1111. </li>
  1112. </ol>
  1113. </div>
  1114. </nav>
  1115. <section class="ac-gf-footer" vocab="https://schema.org/" typeof="Organization"> <div class="ac-gf-footer-shop" x-ms-format-detection="none"></div> <div class="ac-gf-footer-locale"> <a class="ac-gf-footer-locale-link" href="https://support.apple.com/en-us/HT211931/localeselector" title="Choose your country or region" aria-label="United States. Choose your country or region">United States</a> </div> <div class="ac-gf-footer-legal"> <div class="ac-gf-footer-legal-copyright">Copyright © 2021 Apple Inc. All rights reserved.</div> <div class="ac-gf-footer-legal-links"> <a class="ac-gf-footer-legal-link analytics-exitlink" href="https://www.apple.com/legal/privacy/en-ww/">Privacy Policy</a> <a class="ac-gf-footer-legal-link analytics-exitlink" href="https://www.apple.com/legal/internet-services/terms/site.html">Terms of Use</a> <a class="ac-gf-footer-legal-link analytics-exitlink" href="https://www.apple.com/shop/goto/help/sales_refunds">Sales and Refunds</a> <a class="ac-gf-footer-legal-link" href="https://www.apple.com/sitemap/">Site Map</a></div> </div> <meta content="Apple" property="name"> <meta content="1-800-692-7753" property="telephone"> </section>
  1116. </div>
  1117. </footer>
  1118. </div>
  1119. <script src="About%20the%20security%20content%20of%20macOS%20Big%20Sur%2011.0.1%20-%20Apple%20Support_files/FujiStitchPath.js" type="text/javascript" charset="utf-8"></script>
  1120. <script src="About%20the%20security%20content%20of%20macOS%20Big%20Sur%2011.0.1%20-%20Apple%20Support_files/app-ht-route.js" type="text/javascript" charset="utf-8"></script>
  1121. <script src="About%20the%20security%20content%20of%20macOS%20Big%20Sur%2011.0.1%20-%20Apple%20Support_files/accsoffer.js" type="text/javascript" charset="utf-8"></script>
  1122. <script src="About%20the%20security%20content%20of%20macOS%20Big%20Sur%2011.0.1%20-%20Apple%20Support_files/ac-globalnav.js" type="text/javascript" charset="utf-8"></script><div id="ac-gn-viewport-emitter">&nbsp;</div>
  1123. <script src="About%20the%20security%20content%20of%20macOS%20Big%20Sur%2011.0.1%20-%20Apple%20Support_files/launch.js" type="text/javascript" charset="utf-8"></script><script>_satellite["_runScript1"](function(event, target, Promise) {
  1124. try{
  1125. window._analytics = window._analytics || {};
  1126. var mag_glass = document.getElementById("ac-gn-link-search"),
  1127. search_input = document.getElementById("ac-gn-searchform-input");
  1128. function get_index(linkText){
  1129. var arr = document.getElementById("ac-gn-searchresults").getElementsByTagName("li"),
  1130. count = 1;
  1131. while (count > 0) {
  1132. if (arr[count - 1].textContent.trim().toLowerCase() === linkText) {
  1133. break;
  1134. } else {
  1135. count++;
  1136. }
  1137. }
  1138. return count;
  1139. }
  1140. function scrape_link_data(link, linktype){
  1141. var text = link.textContent.trim().toLowerCase(),
  1142. dest = link.getAttribute("href").toLowerCase();
  1143. window._applemd.search = {
  1144. location: "globalnav_support",
  1145. link_type: linktype,
  1146. dest_url: dest,
  1147. link_text: text,
  1148. link_index: get_index(text),
  1149. dest_platform: _satellite.getVar("FN:Get_Link_Dest_Platform")(dest)
  1150. }
  1151. }
  1152. //set beacon for mag glass click
  1153. if (!!mag_glass && !mag_glass.getAttribute("data-analytics-listener-added")) {
  1154. mag_glass.setAttribute("data-analytics-listener-added", "true")
  1155. mag_glass.addEventListener("mousedown", function () {
  1156. window._applemd.search = {
  1157. name: "click-mag-glass",
  1158. link_type: "acs",
  1159. link_text: "internal search"
  1160. }
  1161. _satellite.track("search");
  1162. setTimeout(function(){
  1163. window._applemd.search = {};
  1164. }, 200)
  1165. });
  1166. }
  1167. function link_selected_event(event){
  1168. var target = event.target,
  1169. link_found = false;
  1170. try {
  1171. //bolded text in dropdown links is captured here.
  1172. if (target.tagName !== "A" && target.parentElement.tagName === "A") {
  1173. target = target.parentElement;
  1174. }
  1175. //quick link
  1176. if (target.classList.contains("ac-gn-searchresults-link") && !(target.classList.contains("ac-gn-searchresults-link-suggestions"))) {
  1177. scrape_link_data(target, "quicklink");
  1178. link_found = true;
  1179. }
  1180. //suggested search link
  1181. else if (target.classList.contains("ac-gn-searchresults-link-suggestions")) {
  1182. scrape_link_data(target, "suggested search");
  1183. link_found = true;
  1184. }
  1185. } catch(e) { }
  1186. return link_found;
  1187. }
  1188. //listen for clicks on quick links
  1189. if(!window._analytics.document_listener_added){
  1190. window._analytics.document_listener_added = true;
  1191. document.addEventListener("mousedown", function (event) {
  1192. if(link_selected_event(event)){
  1193. _satellite.track("search");
  1194. }
  1195. })
  1196. }
  1197. //race condition prevents this edge case, page navigates and deselects 'current' before tracking event can fire
  1198. //track user navigates to link with arrow keys and hits enter
  1199. if(!window._analytics.document_key_listener_added){
  1200. window._analytics.document_key_listener_added = true;
  1201. document.addEventListener("keyup", function (event) {
  1202. window._applemd.search = {};
  1203. var current = document.getElementsByClassName("ac-gn-searchresults-link current")[0] || document.querySelector('a[data-focus-method="key"]');
  1204. link_selected_event({target:current})
  1205. })
  1206. document.addEventListener("keydown", function (event) {
  1207. if (event.keyCode === 13 && !!_applemd.search && !!_applemd.search.link_type) {
  1208. _satellite.track("search");
  1209. }
  1210. })
  1211. }
  1212. //track user type search term and hits enter key
  1213. if (!!search_input && !search_input.getAttribute("data-analytics-key-listener-added")) {
  1214. search_input.addEventListener("keydown", function (event) {
  1215. search_input.setAttribute("data-analytics-key-listener-added", "true");
  1216. if (event.keyCode === 13) {
  1217. input = search_input.value.trim().toLowerCase();
  1218. if (input) {
  1219. window._applemd.search = {
  1220. location: "globalnav_support",
  1221. link_type: "user",
  1222. link_text: input,
  1223. dest_url: "https://support.apple.com/kb/index",
  1224. dest_platform: _satellite.getVar("FN:Get_Link_Dest_Platform")("https://support.apple.com/kb/index")
  1225. }
  1226. _satellite.track("search");
  1227. }
  1228. }
  1229. });
  1230. }
  1231. }catch(e){}
  1232. });</script>
  1233. <div id="apd-aria-live-region" aria-live="polite" role="status" class="a11y"></div>
  1234. </body></html>