Blink, as used in Google Chrome before 52.0.2743.116, does not ensure that a taint property is preserved after a structure-clone operation on an ImageBitmap object derived from a cross-origin image, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code.
https://security.gentoo.org/glsa/201610-09
https://codereview.chromium.org/2178513002
https://codereview.chromium.org/2097393002
https://codereview.chromium.org/2096313002
http://www.securitytracker.com/id/1036547
http://www.securityfocus.com/bid/92276
http://rhn.redhat.com/errata/RHSA-2016-1580.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00005.html
http://googlechromereleases.blogspot.com/2016/08/stable-channel-update-for-desktop.html