Google Chrome before 28.0.1500.71 does not properly determine the circumstances in which a renderer process can be considered a trusted process for sign-in and subsequent sync operations, which makes it easier for remote attackers to conduct phishing attacks via a crafted web site.
git.chromium.org/gitweb/?p=chromium/chromium.git%3Ba=commit%3Bh=8a8eb83276778c9fbcf9ebcd4436077269b73074
git.chromium.org/gitweb/?p=chromium/chromium.git%3Ba=commit%3Bh=f0aa298677a1afb9a40b36e32bc9c4d9b4861eac
googlechromereleases.blogspot.com/2013/07/stable-channel-update.html
www.debian.org/security/2013/dsa-2724
code.google.com/p/chromium/issues/detail?id=252062
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17177