Google Chrome users are advised to use the browser's built-in update tool to trigger an update to 72.0.3626.121 version. Users should do this right now.
Google revealed March 5 that a patch for Chrome last week was actually a fix for a zero-day that was under active attacks.
Google described the security flaw as a memory management error in Google Chrome's FileReader --a web API included in all major browsers that lets web apps read the contents of files stored on the user's computer.
More specifically, the bug is a use-after-free vulnerability, a type of memory error that happens when an app tries to access memory after it has been freed/deleted from Chrome's allocated memory. An incorrect handling of this type of memory access operation can lead to the execution of malicious code.
So do the update!