Use-after-free vulnerability in the WebSocketDispatcherHost::SendOrDrop function in content/browser/renderer_host/websocket_dispatcher_host.cc in the Web Sockets implementation in Google Chrome before 33.0.1750.149 might allow remote attackers to bypass the sandbox protection mechanism by leveraging an incorrect deletion in a certain failure case.
https://src.chromium.org/viewvc/chrome?revision=247627&view=revision
https://code.google.com/p/chromium/issues/detail?id=338354
http://www.securitytracker.com/id/1029914
http://www.debian.org/security/2014/dsa-2883
http://security.gentoo.org/glsa/glsa-201408-16.xml
http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00008.html
http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html