High severity7.8NVD Advisory· Published Mar 26, 2026· Updated May 1, 2026
CVE-2026-33491
CVE-2026-33491
Description
Zen C is a systems programming language that compiles to human-readable GNU C/C11. Prior to version 0.4.4, a stack-based buffer overflow vulnerability in the Zen C compiler allows attackers to cause a compiler crash or potentially execute arbitrary code by providing a specially crafted Zen C source file (.zc) with excessively long struct, function, or trait identifiers. Users are advised to update to Zen C version v0.4.4 or later to receive a patch.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- github.com/zenc-lang/zenc/security/advisories/GHSA-rv74-w6q7-h8xrnvdExploitMitigationVendor Advisory
News mentions
0No linked articles in our index yet.