Use-after-free vulnerability in the Channel::SendRTCPPacket function in voice_engine/channel.cc in libjingle in WebRTC, as used in Google Chrome before 31.0.1650.48 and other products, allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via vectors that trigger the absence of certain statistics initialization, leading to the skipping of a required DeRegisterExternalTransport call.
https://webrtc-codereview.appspot.com/2275008
https://code.google.com/p/webrtc/source/detail?r=4827
https://code.google.com/p/chromium/issues/detail?id=296804
http://www.debian.org/security/2013/dsa-2799
http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html
http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00025.html
http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html