Zen C is a systems programming language that compiles to human-readable GNU C/C11. Prior to version 0.4.4, a stack-based buffer overflow vulnerability in the Zen C compiler allows attackers to cause a compiler crash or potentially execute arbitrary code by providing a specially crafted Zen C source file (`.zc`) with excessively long struct, function, or trait identifiers. Users are advised to update to Zen C version v0.4.4 or later to receive a patch.
References
| Link | Resource |
|---|---|
| https://github.com/zenc-lang/zenc/security/advisories/GHSA-rv74-w6q7-h8xr | Exploit Mitigation Vendor Advisory |
Configurations
History
02 Apr 2026, 18:22
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/zenc-lang/zenc/security/advisories/GHSA-rv74-w6q7-h8xr - Exploit, Mitigation, Vendor Advisory | |
| First Time |
Z-libs
Z-libs zen C |
|
| CPE | cpe:2.3:a:z-libs:zen_c:*:*:*:*:*:*:*:* |
30 Mar 2026, 13:26
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
26 Mar 2026, 19:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-26 19:17
Updated : 2026-04-02 18:22
NVD link : CVE-2026-33491
Mitre link : CVE-2026-33491
CVE.ORG link : CVE-2026-33491
JSON object : View
Products Affected
z-libs
- zen_c
