CVE-2024-44185
Description
The issue was addressed with improved checks. This issue is fixed in Safari 17.6, iOS 17.6 and iPadOS 17.6, macOS Sonoma 14.6, tvOS 17.6, visionOS 1.3, watchOS 10.6. Processing maliciously crafted web content may lead to an unexpected process crash.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Processing maliciously crafted web content in Safari and other WebKit-based components on Apple platforms can cause an unexpected process crash.
Vulnerability
Overview CVE-2024-44185 is a vulnerability in WebKit, affecting Safari and other WebKit-based components across Apple platforms. The issue was addressed with improved checks in the affected software. Processing maliciously crafted web content may lead to an unexpected process crash, resulting in a denial-of-service condition.
Exploitation
An attacker can exploit this vulnerability by crafting malicious web content and enticing a user to process it, typically through a web link or embedded web content. No elevated privileges or special network position is required; the attack relies on user interaction.
Impact
Successful exploitation causes the application (such as Safari or any app using WebKit) to crash, disrupting service. This is a denial-of-service issue, as the process termination temporarily prevents the user from accessing the application.
Mitigation
Apple has released patches in Safari 17.6, iOS 17.6 and iPadOS 17.6, macOS Sonoma 14.6, tvOS 17.6, visionOS 1.3, and watchOS 10.6 [1][2][3][4]. Users should update their devices to the latest available versions to mitigate this vulnerability.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
59- osv-coords52 versionspkg:rpm/almalinux/webkit2gtk3pkg:rpm/almalinux/webkit2gtk3-develpkg:rpm/almalinux/webkit2gtk3-jscpkg:rpm/almalinux/webkit2gtk3-jsc-develpkg:rpm/opensuse/webkit2gtk3&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/webkit2gtk3&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/webkit2gtk3-soup2&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/webkit2gtk3-soup2&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/webkit2gtk4&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/webkit2gtk4&distro=openSUSE%20Leap%2015.6pkg:rpm/suse/webkit2gtk3&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSSpkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-ESPOSpkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-LTSSpkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOSpkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-LTSSpkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Desktop%20Applications%2015%20SP5pkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Desktop%20Applications%2015%20SP6pkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSSpkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSSpkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP4-LTSSpkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP5-LTSSpkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2pkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP4pkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP5pkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5pkg:rpm/suse/webkit2gtk3-soup2&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-ESPOSpkg:rpm/suse/webkit2gtk3-soup2&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-LTSSpkg:rpm/suse/webkit2gtk3-soup2&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOSpkg:rpm/suse/webkit2gtk3-soup2&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-LTSSpkg:rpm/suse/webkit2gtk3-soup2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP5pkg:rpm/suse/webkit2gtk3-soup2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP6pkg:rpm/suse/webkit2gtk3-soup2&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP4-LTSSpkg:rpm/suse/webkit2gtk3-soup2&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP5-LTSSpkg:rpm/suse/webkit2gtk3-soup2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP4pkg:rpm/suse/webkit2gtk3-soup2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP5pkg:rpm/suse/webkit2gtk3-soup2&distro=SUSE%20Manager%20Proxy%204.3pkg:rpm/suse/webkit2gtk3-soup2&distro=SUSE%20Manager%20Server%204.3pkg:rpm/suse/webkit2gtk4&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-ESPOSpkg:rpm/suse/webkit2gtk4&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-LTSSpkg:rpm/suse/webkit2gtk4&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOSpkg:rpm/suse/webkit2gtk4&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-LTSSpkg:rpm/suse/webkit2gtk4&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP6pkg:rpm/suse/webkit2gtk4&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP5pkg:rpm/suse/webkit2gtk4&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP6pkg:rpm/suse/webkit2gtk4&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP4-LTSSpkg:rpm/suse/webkit2gtk4&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP5-LTSSpkg:rpm/suse/webkit2gtk4&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP4pkg:rpm/suse/webkit2gtk4&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP5
< 2.46.3-1.el9_5+ 51 more
- (no CPE)range: < 2.46.3-1.el9_5
- (no CPE)range: < 2.46.3-1.el9_5
- (no CPE)range: < 2.46.3-1.el9_5
- (no CPE)range: < 2.46.3-1.el9_5
- (no CPE)range: < 2.46.3-150400.4.97.1
- (no CPE)range: < 2.46.3-150600.12.16.1
- (no CPE)range: < 2.46.3-150400.4.97.1
- (no CPE)range: < 2.46.3-150600.12.16.1
- (no CPE)range: < 2.46.3-150400.4.97.1
- (no CPE)range: < 2.46.3-150600.12.16.1
- (no CPE)range: < 2.46.3-150200.127.1
- (no CPE)range: < 2.46.3-150200.127.1
- (no CPE)range: < 2.46.3-150200.127.1
- (no CPE)range: < 2.46.3-150400.4.97.1
- (no CPE)range: < 2.46.3-150400.4.97.1
- (no CPE)range: < 2.46.5-150400.4.103.1
- (no CPE)range: < 2.46.5-150400.4.103.1
- (no CPE)range: < 2.46.3-150400.4.97.1
- (no CPE)range: < 2.46.3-150600.12.16.1
- (no CPE)range: < 2.46.5-4.25.1
- (no CPE)range: < 2.46.3-150200.127.1
- (no CPE)range: < 2.46.3-150200.127.1
- (no CPE)range: < 2.46.3-150400.4.97.1
- (no CPE)range: < 2.46.5-150400.4.103.1
- (no CPE)range: < 2.46.3-150200.127.1
- (no CPE)range: < 2.46.3-150200.127.1
- (no CPE)range: < 2.46.3-150400.4.97.1
- (no CPE)range: < 2.46.5-150400.4.103.1
- (no CPE)range: < 2.46.5-4.25.1
- (no CPE)range: < 2.46.3-150400.4.97.1
- (no CPE)range: < 2.46.3-150400.4.97.1
- (no CPE)range: < 2.46.5-150400.4.103.1
- (no CPE)range: < 2.46.5-150400.4.103.1
- (no CPE)range: < 2.46.3-150400.4.97.1
- (no CPE)range: < 2.46.3-150600.12.16.1
- (no CPE)range: < 2.46.3-150400.4.97.1
- (no CPE)range: < 2.46.5-150400.4.103.1
- (no CPE)range: < 2.46.3-150400.4.97.1
- (no CPE)range: < 2.46.5-150400.4.103.1
- (no CPE)range: < 2.46.3-150400.4.97.1
- (no CPE)range: < 2.46.3-150400.4.97.1
- (no CPE)range: < 2.46.3-150400.4.97.1
- (no CPE)range: < 2.46.3-150400.4.97.1
- (no CPE)range: < 2.46.5-150400.4.103.1
- (no CPE)range: < 2.46.5-150400.4.103.1
- (no CPE)range: < 2.46.3-150600.12.16.1
- (no CPE)range: < 2.46.3-150400.4.97.1
- (no CPE)range: < 2.46.3-150600.12.16.1
- (no CPE)range: < 2.46.3-150400.4.97.1
- (no CPE)range: < 2.46.5-150400.4.103.1
- (no CPE)range: < 2.46.3-150400.4.97.1
- (no CPE)range: < 2.46.5-150400.4.103.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- support.apple.com/en-us/120909nvdRelease NotesVendor Advisory
- support.apple.com/en-us/120911nvdRelease NotesVendor Advisory
- support.apple.com/en-us/120913nvdRelease NotesVendor Advisory
- support.apple.com/en-us/120914nvdRelease NotesVendor Advisory
- support.apple.com/en-us/120915nvdRelease NotesVendor Advisory
- support.apple.com/en-us/120916nvdRelease NotesVendor Advisory
- lists.debian.org/debian-lts-announce/2024/11/msg00019.htmlnvd
News mentions
0No linked articles in our index yet.