CVE-2026-26073

EVerest is an EV charging software stack. Versions prior to 2026.02.0 have a data race leading to possible `std::queue`/`std::deque` corruption. The trigger is powermeter public key update and EV session/error events (while OCPP not started). This results in a TSAN data race report and an ASAN/UBSAN misaligned address runtime error being observed. Version 2026.02.0 contains a patch.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linuxfoundation:everest:*:*:*:*:*:*:*:*

History

30 Mar 2026, 21:04

Type Values Removed Values Added
CWE CWE-787
References () https://github.com/EVerest/EVerest/security/advisories/GHSA-jf36-f4f9-7qc2 - () https://github.com/EVerest/EVerest/security/advisories/GHSA-jf36-f4f9-7qc2 - Vendor Advisory
First Time Linuxfoundation
Linuxfoundation everest
CPE cpe:2.3:o:linuxfoundation:everest:*:*:*:*:*:*:*:*

Information

Published : 2026-03-26 17:16

Updated : 2026-03-30 21:04


NVD link : CVE-2026-26073

Mitre link : CVE-2026-26073

CVE.ORG link : CVE-2026-26073


JSON object : View

Products Affected

linuxfoundation

  • everest
CWE
CWE-122

Heap-based Buffer Overflow

CWE-787

Out-of-bounds Write