Google Chrome before 30.0.1599.66 uses incorrect function calls to determine the values of NavigationEntry objects, which allows remote attackers to spoof the address bar via vectors involving a response with a 204 (aka No Content) status code.Referenceshttp://googlechromereleases.blogspot.com/2013/10/stable-channel-update.htmlhttp://lists.opensuse.org/opensuse-updates/2014-01/msg00042.htmlhttp://www.debian.org/security/2013/dsa-2785http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00002.htmlhttps://code.google.com/p/chromium/issues/detail?id=265221https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18782https://src.chromium.org/viewvc/chrome?revision=217485&view=revisionhttp://lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html