Common Vulnerabilities and Exposures assigned an identifier CVE-2014-3188 to the following vulnerability: Name: CVE-2014-3188 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3188 Assigned: 20140503 Reference: http://googlechromereleases.blogspot.com/2014/10/stable-channel-update-for-chrome-os.html Reference: http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html Reference: https://code.google.com/p/v8/source/detail?r=24125 Reference: https://crbug.com/416449 Google Chrome before 38.0.2125.101 and Chrome OS before 38.0.2125.101 do not properly handle the interaction of IPC and Google V8, which allows remote attackers to execute arbitrary code via vectors involving JSON data, related to improper parsing of an escaped index by ParseJsonObject in json-parser.h. From an initial inspection, the affected function does not appear to be in Fedora v8 or the ruby193-v8-3.14.5.10 packages.
This issue has been addressed in the following products: Supplementary for Red Hat Enterprise Linux 6 Via RHSA-2014:1626 https://rhn.redhat.com/errata/RHSA-2014-1626.html
manifest.txt:36260:rhn_satellite:6.5/v8-3.14.5.10-19.el7sat At this time, we have no additional z-streams planned for sat-6.5.z. Based upon that and that this is a low severity issue, closing this one as wontfix. Ref: https://access.redhat.com/support/policy/updates/satellite