Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 31 Mar 2026 03:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linuxfoundation
Linuxfoundation everest |
|
| CPEs | cpe:2.3:o:linuxfoundation:everest:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Linuxfoundation
Linuxfoundation everest |
Fri, 27 Mar 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Everest
Everest everest-core |
|
| Vendors & Products |
Everest
Everest everest-core |
Thu, 26 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 26 Mar 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | EVerest is an EV charging software stack. Versions prior to 2026.02.0 have a data race leading to possible `std::map<std::queue>` corruption. The trigger is CSMS GetLog/UpdateFirmware request (network) with an EVSE fault event (physical). This results in TSAN reports concurrent access (data race) to `event_queue`. Version 2026.2.0 contains a patch. | |
| Title | EVerest: OCPP201 startup event_queue lock mismatch leads to std::map/std::queue data race | |
| Weaknesses | CWE-362 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-26T18:24:25.673Z
Reserved: 2026-02-10T18:01:31.901Z
Link: CVE-2026-26074
Updated: 2026-03-26T17:49:52.024Z
Status : Analyzed
Published: 2026-03-26T17:16:33.407
Modified: 2026-03-30T20:57:44.247
Link: CVE-2026-26074
No data.
OpenCVE Enrichment
Updated: 2026-03-31T20:08:55Z