The Web Cryptography API (aka WebCrypto) implementation in Blink, as used in Google Chrome before 52.0.2743.116, does not properly copy data buffers, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted JavaScript code, related to NormalizeAlgorithm.cpp and SubtleCrypto.cpp.
https://security.gentoo.org/glsa/201610-09
https://codereview.chromium.org/2141843002/
http://www.securitytracker.com/id/1036547
http://www.securityfocus.com/bid/92276
http://www.debian.org/security/2016/dsa-3645
http://rhn.redhat.com/errata/RHSA-2016-1580.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00005.html
http://googlechromereleases.blogspot.com/2016/08/stable-channel-update-for-desktop.html