The HTTPS implementation in Google Chrome before 28.0.1500.71 does not ensure that headers are terminated by \r\n\r\n (carriage return, newline, carriage return, newline), which allows man-in-the-middle attackers to have an unspecified impact via vectors that trigger header truncation.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17033
https://code.google.com/p/chromium/issues/detail?id=244260
http://www.debian.org/security/2013/dsa-2724
http://googlechromereleases.blogspot.com/2013/07/stable-channel-update.html