CVE-2026-33491

Zen C is a systems programming language that compiles to human-readable GNU C/C11. Prior to version 0.4.4, a stack-based buffer overflow vulnerability in the Zen C compiler allows attackers to cause a compiler crash or potentially execute arbitrary code by providing a specially crafted Zen C source file (`.zc`) with excessively long struct, function, or trait identifiers. Users are advised to update to Zen C version v0.4.4 or later to receive a patch.
References
Link Resource
https://github.com/zenc-lang/zenc/security/advisories/GHSA-rv74-w6q7-h8xr Exploit Mitigation Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:z-libs:zen_c:*:*:*:*:*:*:*:*

History

02 Apr 2026, 18:22

Type Values Removed Values Added
References () https://github.com/zenc-lang/zenc/security/advisories/GHSA-rv74-w6q7-h8xr - () https://github.com/zenc-lang/zenc/security/advisories/GHSA-rv74-w6q7-h8xr - Exploit, Mitigation, Vendor Advisory
First Time Z-libs
Z-libs zen C
CPE cpe:2.3:a:z-libs:zen_c:*:*:*:*:*:*:*:*

30 Mar 2026, 13:26

Type Values Removed Values Added
Summary
  • (es) Zen C es un lenguaje de programación de sistemas que compila a GNU C/C11 legible por humanos. Antes de la versión 0.4.4, una vulnerabilidad de desbordamiento de búfer basado en pila en el compilador de Zen C permite a los atacantes causar un fallo del compilador o potencialmente ejecutar código arbitrario al proporcionar un archivo fuente de Zen C especialmente diseñado ('.zc') con identificadores de estructura, función o rasgo excesivamente largos. Se aconseja a los usuarios actualizar a la versión v0.4.4 de Zen C o posterior para recibir un parche.

26 Mar 2026, 19:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-26 19:17

Updated : 2026-04-02 18:22


NVD link : CVE-2026-33491

Mitre link : CVE-2026-33491

CVE.ORG link : CVE-2026-33491


JSON object : View

Products Affected

z-libs

  • zen_c
CWE
CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write