The ContainerNode::parserRemoveChild function in WebKit/Source/core/dom/ContainerNode.cpp in Blink, as used in Google Chrome before 49.0.2623.75, mishandles widget updates, which makes it easier for remote attackers to bypass the Same Origin Policy via a crafted web site.
https://security.gentoo.org/glsa/201603-09
https://codereview.chromium.org/1464223002
https://code.google.com/p/chromium/issues/detail?id=560011
http://www.ubuntu.com/usn/USN-2920-1
http://www.securitytracker.com/id/1035185
http://www.securityfocus.com/bid/84008
http://www.debian.org/security/2016/dsa-3507
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html
http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html