Description
Zen C is a systems programming language that compiles to human-readable GNU C/C11. Prior to version 0.4.4, a stack-based buffer overflow vulnerability in the Zen C compiler allows attackers to cause a compiler crash or potentially execute arbitrary code by providing a specially crafted Zen C source file (`.zc`) with excessively long struct, function, or trait identifiers. Users are advised to update to Zen C version v0.4.4 or later to receive a patch.
INFO
Published Date :
2026-03-26T18:39:55.093Z
Last Modified :
2026-03-27T03:55:39.895Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-33491 vulnerability.
| Vendors | Products |
|---|---|
| Zenc-lang |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-33491.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact