Description

Zen C is a systems programming language that compiles to human-readable GNU C/C11. Prior to version 0.4.4, a stack-based buffer overflow vulnerability in the Zen C compiler allows attackers to cause a compiler crash or potentially execute arbitrary code by providing a specially crafted Zen C source file (`.zc`) with excessively long struct, function, or trait identifiers. Users are advised to update to Zen C version v0.4.4 or later to receive a patch.

INFO

Published Date :

2026-03-26T18:39:55.093Z

Last Modified :

2026-03-27T03:55:39.895Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-33491 vulnerability.

Vendors Products
Zenc-lang
  • Zenc
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-33491.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact