Zen C is a systems programming language that compiles to human-readable GNU C/C11. Prior to version 0.4.4, a stack-based buffer overflow vulnerability in the Zen C compiler allows attackers to cause a compiler crash or potentially execute arbitrary code by providing a specially crafted Zen C source file (`.zc`) with excessively long struct, function, or trait identifiers. Users are advised to update to Zen C version v0.4.4 or later to receive a patch.
References
Configurations
No configuration.
History
No history.
Information
Published : 2026-03-26 19:17
Updated : 2026-03-30 13:26
NVD link : CVE-2026-33491
Mitre link : CVE-2026-33491
CVE.ORG link : CVE-2026-33491
JSON object : View
Products Affected
No product.
