Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2026:2115 - Security Advisory
Issued:
2026-02-05
Updated:
2026-02-05

RHSA-2026:2115 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kpatch-patch-5_14_0-284_104_1, kpatch-patch-5_14_0-284_117_1, kpatch-patch-5_14_0-284_134_1, kpatch-patch-5_14_0-284_148_1, and kpatch-patch-5_14_0-284_92_1 security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for multiple packages is now available for Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

This is a kernel live patch module which can be loaded by the kpatch command line utility to modify the code of a running kernel. This patch module is targeted for kernel-5.14.0-284.92.1.el9_2.

Security Fix(es):

  • kernel: libceph: fix potential use-after-free in have_mon_and_osd_map() (CVE-2025-68285)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server - AUS 9.2 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64

Fixes

  • BZ - 2422801 - CVE-2025-68285 kernel: libceph: fix potential use-after-free in have_mon_and_osd_map()

CVEs

  • CVE-2025-68285

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server - AUS 9.2

SRPM
kpatch-patch-5_14_0-284_104_1-1-12.el9_2.src.rpm SHA-256: 61d86679dc8a1f2a694054cac56dc289346c84cbde3de7446e48a0985588cdce
kpatch-patch-5_14_0-284_117_1-1-9.el9_2.src.rpm SHA-256: d221d9d77ffc57925b77bf3428f88cc63c18204dc4bfd6b0b50a643ad533eacf
kpatch-patch-5_14_0-284_134_1-1-3.el9_2.src.rpm SHA-256: 72f9df573c440c2566c94d4321eb062e8abbf51e9b40877aa26e42bb3aa880c7
kpatch-patch-5_14_0-284_148_1-1-1.el9_2.src.rpm SHA-256: ff8397dfb78c4f05f5da9f6f7513feac57226f82b56a4a249f25f72a659b49fa
kpatch-patch-5_14_0-284_92_1-1-14.el9_2.src.rpm SHA-256: c6d4306baf690cfe61da6c5da95093414e37d469a32a0962a0a55ae71d73cba9
x86_64
kpatch-patch-5_14_0-284_104_1-1-12.el9_2.x86_64.rpm SHA-256: b05ef5c45736a738d21df1280f8428cd02d20d6f9a766aa1c0db375942b800aa
kpatch-patch-5_14_0-284_104_1-debuginfo-1-12.el9_2.x86_64.rpm SHA-256: 2c9a1014e1207127d1cf4e0c42311a6ce6df49e8ab8d5512bf3e5b8a1b8dacb6
kpatch-patch-5_14_0-284_104_1-debugsource-1-12.el9_2.x86_64.rpm SHA-256: 641ef125b4a2c197784da351d7d15445ecb06afc9b65a282e8d04b3907326223
kpatch-patch-5_14_0-284_117_1-1-9.el9_2.x86_64.rpm SHA-256: a47eb341b6de68baef48d213a914748c91f309edff5eec7ff6ccd0a0f2e5c82c
kpatch-patch-5_14_0-284_117_1-debuginfo-1-9.el9_2.x86_64.rpm SHA-256: 7e08ea7cd846b2ae658005760dd291c20a757504aabf9be9a9e7a85d18c757df
kpatch-patch-5_14_0-284_117_1-debugsource-1-9.el9_2.x86_64.rpm SHA-256: b3ed46d1da9c6d1839c6def51c9b77ec21d05a6c24eb47189b3456efd2e3bab6
kpatch-patch-5_14_0-284_134_1-1-3.el9_2.x86_64.rpm SHA-256: 91a0777c9a8c5902254001d31ca76703dfb20b359d9e580b4d74533a3be5e5ba
kpatch-patch-5_14_0-284_134_1-debuginfo-1-3.el9_2.x86_64.rpm SHA-256: 96db17b46eb541e945f0963915c43f4c6ee0db0316b24047def0420b3a92856d
kpatch-patch-5_14_0-284_134_1-debugsource-1-3.el9_2.x86_64.rpm SHA-256: ef3af9c78944e747a23548dfdb504ef1d1fd68cec2e97e2eadf2421dcadb477f
kpatch-patch-5_14_0-284_148_1-1-1.el9_2.x86_64.rpm SHA-256: 7171029afc66d774e50c68abe88f16db5b87147b1a7f0fca624cefbb021ba626
kpatch-patch-5_14_0-284_148_1-debuginfo-1-1.el9_2.x86_64.rpm SHA-256: fe683d054ea2f4aaebc9398c123d90782ad1880969e68a2b64fad0d97b165945
kpatch-patch-5_14_0-284_148_1-debugsource-1-1.el9_2.x86_64.rpm SHA-256: d4967b9404740e207e941962af404beb6a221e94c68ede178ec06ea3e3ea98c6
kpatch-patch-5_14_0-284_92_1-1-14.el9_2.x86_64.rpm SHA-256: 18d53c42ea6806fa66da32de8eb287ed8f9fad681d7b38a08c1dc2edfe278cc0
kpatch-patch-5_14_0-284_92_1-debuginfo-1-14.el9_2.x86_64.rpm SHA-256: 31daaa6fa6e0014ca3fe4ed7df9890aa300087ee7839428dae57c4e60bf7ea9a
kpatch-patch-5_14_0-284_92_1-debugsource-1-14.el9_2.x86_64.rpm SHA-256: cdd47fc6d58f172be1d87ded10474ec32fe4fda2323ab9d9cf1b58835ae1334f

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2

SRPM
kpatch-patch-5_14_0-284_104_1-1-12.el9_2.src.rpm SHA-256: 61d86679dc8a1f2a694054cac56dc289346c84cbde3de7446e48a0985588cdce
kpatch-patch-5_14_0-284_117_1-1-9.el9_2.src.rpm SHA-256: d221d9d77ffc57925b77bf3428f88cc63c18204dc4bfd6b0b50a643ad533eacf
kpatch-patch-5_14_0-284_134_1-1-3.el9_2.src.rpm SHA-256: 72f9df573c440c2566c94d4321eb062e8abbf51e9b40877aa26e42bb3aa880c7
kpatch-patch-5_14_0-284_148_1-1-1.el9_2.src.rpm SHA-256: ff8397dfb78c4f05f5da9f6f7513feac57226f82b56a4a249f25f72a659b49fa
kpatch-patch-5_14_0-284_92_1-1-14.el9_2.src.rpm SHA-256: c6d4306baf690cfe61da6c5da95093414e37d469a32a0962a0a55ae71d73cba9
ppc64le
kpatch-patch-5_14_0-284_104_1-1-12.el9_2.ppc64le.rpm SHA-256: 0eed69826d31a0e0e2fac014b1db752f60792f22d55aec990f215e5fc337d6a8
kpatch-patch-5_14_0-284_104_1-debuginfo-1-12.el9_2.ppc64le.rpm SHA-256: 1257c39844802a36322db5b782c4cc8fd9902674e2b8c0553c70acfedfdead6c
kpatch-patch-5_14_0-284_104_1-debugsource-1-12.el9_2.ppc64le.rpm SHA-256: 9fc7c2b321716a6fad125242b3d13bca7e66ed4d4c728ec1951a95a053ed3331
kpatch-patch-5_14_0-284_117_1-1-9.el9_2.ppc64le.rpm SHA-256: d5ab7358d932e3d41731255e7843ba1f9a4e6706cdca049f4fef427b7d5e6c28
kpatch-patch-5_14_0-284_117_1-debuginfo-1-9.el9_2.ppc64le.rpm SHA-256: a8925b7c45f678f971c0ad48dd3ef371f64661152dba7b5a043952649b2d5000
kpatch-patch-5_14_0-284_117_1-debugsource-1-9.el9_2.ppc64le.rpm SHA-256: ac0f0c42d073df18b651f82f90c999d0d42b84ad35e7d5a98a4e83782cf728a6
kpatch-patch-5_14_0-284_134_1-1-3.el9_2.ppc64le.rpm SHA-256: d6d09a3fe0566dab070f9b8872368d617c7a5149b66f30adfc214cec8bba8463
kpatch-patch-5_14_0-284_134_1-debuginfo-1-3.el9_2.ppc64le.rpm SHA-256: e938c7b098261f3fe8b66f56c3bd56edbd1f1bdaa70f3f39f5d913dd312478d3
kpatch-patch-5_14_0-284_134_1-debugsource-1-3.el9_2.ppc64le.rpm SHA-256: 2f713ca7ddb408bbb6e0033a11121cfb6b8fa7732fb064c6b28b645e23c8440d
kpatch-patch-5_14_0-284_148_1-1-1.el9_2.ppc64le.rpm SHA-256: b38c0d517c0d347c879870a5e3664ac2d2945f23f8935aabd81438364027c22f
kpatch-patch-5_14_0-284_148_1-debuginfo-1-1.el9_2.ppc64le.rpm SHA-256: 000da02958b48e424b66dec630c300fd6bc11431b7acaf235d7dd3c557e4c0dc
kpatch-patch-5_14_0-284_148_1-debugsource-1-1.el9_2.ppc64le.rpm SHA-256: 3bd890c119084a7a7badcf658b2724932c6d9bf02d6a1adc509afb202438b544
kpatch-patch-5_14_0-284_92_1-1-14.el9_2.ppc64le.rpm SHA-256: d0ceb3b953bef31024b9f77d1b3808b58990bbf79a0370762129e95b182e8f90
kpatch-patch-5_14_0-284_92_1-debuginfo-1-14.el9_2.ppc64le.rpm SHA-256: a0502847c5026c1d99a9a93a2feae5227af321fe4bf59625b3b28836f01810b0
kpatch-patch-5_14_0-284_92_1-debugsource-1-14.el9_2.ppc64le.rpm SHA-256: 15785f53bd85c42fce715ea874e271457279b1d7d98276beaed2f909b2f5b899

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2

SRPM
kpatch-patch-5_14_0-284_104_1-1-12.el9_2.src.rpm SHA-256: 61d86679dc8a1f2a694054cac56dc289346c84cbde3de7446e48a0985588cdce
kpatch-patch-5_14_0-284_117_1-1-9.el9_2.src.rpm SHA-256: d221d9d77ffc57925b77bf3428f88cc63c18204dc4bfd6b0b50a643ad533eacf
kpatch-patch-5_14_0-284_134_1-1-3.el9_2.src.rpm SHA-256: 72f9df573c440c2566c94d4321eb062e8abbf51e9b40877aa26e42bb3aa880c7
kpatch-patch-5_14_0-284_148_1-1-1.el9_2.src.rpm SHA-256: ff8397dfb78c4f05f5da9f6f7513feac57226f82b56a4a249f25f72a659b49fa
kpatch-patch-5_14_0-284_92_1-1-14.el9_2.src.rpm SHA-256: c6d4306baf690cfe61da6c5da95093414e37d469a32a0962a0a55ae71d73cba9
x86_64
kpatch-patch-5_14_0-284_104_1-1-12.el9_2.x86_64.rpm SHA-256: b05ef5c45736a738d21df1280f8428cd02d20d6f9a766aa1c0db375942b800aa
kpatch-patch-5_14_0-284_104_1-debuginfo-1-12.el9_2.x86_64.rpm SHA-256: 2c9a1014e1207127d1cf4e0c42311a6ce6df49e8ab8d5512bf3e5b8a1b8dacb6
kpatch-patch-5_14_0-284_104_1-debugsource-1-12.el9_2.x86_64.rpm SHA-256: 641ef125b4a2c197784da351d7d15445ecb06afc9b65a282e8d04b3907326223
kpatch-patch-5_14_0-284_117_1-1-9.el9_2.x86_64.rpm SHA-256: a47eb341b6de68baef48d213a914748c91f309edff5eec7ff6ccd0a0f2e5c82c
kpatch-patch-5_14_0-284_117_1-debuginfo-1-9.el9_2.x86_64.rpm SHA-256: 7e08ea7cd846b2ae658005760dd291c20a757504aabf9be9a9e7a85d18c757df
kpatch-patch-5_14_0-284_117_1-debugsource-1-9.el9_2.x86_64.rpm SHA-256: b3ed46d1da9c6d1839c6def51c9b77ec21d05a6c24eb47189b3456efd2e3bab6
kpatch-patch-5_14_0-284_134_1-1-3.el9_2.x86_64.rpm SHA-256: 91a0777c9a8c5902254001d31ca76703dfb20b359d9e580b4d74533a3be5e5ba
kpatch-patch-5_14_0-284_134_1-debuginfo-1-3.el9_2.x86_64.rpm SHA-256: 96db17b46eb541e945f0963915c43f4c6ee0db0316b24047def0420b3a92856d
kpatch-patch-5_14_0-284_134_1-debugsource-1-3.el9_2.x86_64.rpm SHA-256: ef3af9c78944e747a23548dfdb504ef1d1fd68cec2e97e2eadf2421dcadb477f
kpatch-patch-5_14_0-284_148_1-1-1.el9_2.x86_64.rpm SHA-256: 7171029afc66d774e50c68abe88f16db5b87147b1a7f0fca624cefbb021ba626
kpatch-patch-5_14_0-284_148_1-debuginfo-1-1.el9_2.x86_64.rpm SHA-256: fe683d054ea2f4aaebc9398c123d90782ad1880969e68a2b64fad0d97b165945
kpatch-patch-5_14_0-284_148_1-debugsource-1-1.el9_2.x86_64.rpm SHA-256: d4967b9404740e207e941962af404beb6a221e94c68ede178ec06ea3e3ea98c6
kpatch-patch-5_14_0-284_92_1-1-14.el9_2.x86_64.rpm SHA-256: 18d53c42ea6806fa66da32de8eb287ed8f9fad681d7b38a08c1dc2edfe278cc0
kpatch-patch-5_14_0-284_92_1-debuginfo-1-14.el9_2.x86_64.rpm SHA-256: 31daaa6fa6e0014ca3fe4ed7df9890aa300087ee7839428dae57c4e60bf7ea9a
kpatch-patch-5_14_0-284_92_1-debugsource-1-14.el9_2.x86_64.rpm SHA-256: cdd47fc6d58f172be1d87ded10474ec32fe4fda2323ab9d9cf1b58835ae1334f

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility