Use-after-free vulnerability in core/xml/XMLHttpRequest.cpp in Blink, as used in Google Chrome before 30.0.1599.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger multiple conflicting uses of the same XMLHttpRequest object.
googlechromereleases.blogspot.com/2013/10/stable-channel-update_15.html
lists.opensuse.org/opensuse-security-announce/2013-11/msg00025.html
lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html
lists.opensuse.org/opensuse-updates/2013-11/msg00077.html
lists.opensuse.org/opensuse-updates/2014-01/msg00042.html
www.debian.org/security/2013/dsa-2785
code.google.com/p/chromium/issues/detail?id=292422
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18866
src.chromium.org/viewvc/blink?revision=158146&view=revision