Use-after-free vulnerability in Google Chrome before 28.0.1500.71 allows remote servers to execute arbitrary code via crafted response traffic after a URL request.
git.chromium.org/gitweb/?p=chromium/chromium.git%3Ba=commit%3Bh=2b0ff6d8a832f4fe5c187b17342b56675fbf7b96
git.chromium.org/gitweb/?p=chromium/chromium.git%3Ba=commit%3Bh=5449227016f44d7c023b28a697ada40064c681a6
googlechromereleases.blogspot.com/2013/07/stable-channel-update.html
www.debian.org/security/2013/dsa-2724
code.google.com/p/chromium/issues/detail?id=242762
code.google.com/p/chromium/issues/detail?id=244746
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16723