Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2026:2557 - Security Advisory
Issued:
2026-02-11
Updated:
2026-02-11

RHSA-2026:2557 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kpatch-patch-4_18_0-477_107_1, kpatch-patch-4_18_0-477_120_1, kpatch-patch-4_18_0-477_81_1, kpatch-patch-4_18_0-477_89_1, and kpatch-patch-4_18_0-477_97_1 security update

Type/Severity

Security Advisory: Moderate

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for multiple packages is now available for Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

This is a kernel live patch module which can be loaded by the kpatch command line utility to modify the code of a running kernel. This patch module is targeted for kernel-4.18.0-477.81.1.el8_8.

Security Fix(es):

  • kernel: libceph: fix potential use-after-free in have_mon_and_osd_map() (CVE-2025-68285)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.8 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8 x86_64

Fixes

  • BZ - 2422801 - CVE-2025-68285 kernel: libceph: fix potential use-after-free in have_mon_and_osd_map()

CVEs

  • CVE-2025-68285

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.8

SRPM
kpatch-patch-4_18_0-477_107_1-1-2.el8_8.src.rpm SHA-256: bf072e926db5f90e0762b0369453ad5459fc3db2d27ba50781b460da05ab2b72
kpatch-patch-4_18_0-477_120_1-1-1.el8_8.src.rpm SHA-256: c4249c1d711c3f9274e59455d207fce8c83f2a1c41316a96978c19653a7ab4dd
kpatch-patch-4_18_0-477_81_1-1-10.el8_8.src.rpm SHA-256: d0470dac62fef083ef32758667ccee9ff40455d432b86611778e1def4ce51868
kpatch-patch-4_18_0-477_89_1-1-8.el8_8.src.rpm SHA-256: f80e1418ae18cf6e9f62c1acde8430dbbb9ab3028ed057cc089f64ae084ea640
kpatch-patch-4_18_0-477_97_1-1-6.el8_8.src.rpm SHA-256: 5d316725474e00abc8a552ce698fbb9a8589241789aae0130773df5ed728b833
x86_64
kpatch-patch-4_18_0-477_107_1-1-2.el8_8.x86_64.rpm SHA-256: 0cc77d9867fe33a8ebab1e5dcdb54489b3ec4fbadf4909ee5eecc94f0a7b096b
kpatch-patch-4_18_0-477_107_1-debuginfo-1-2.el8_8.x86_64.rpm SHA-256: 6d58b6ee9b8c09a7ed796c2db6ea965c59a8b1a39bd4163f6cc8079c357f538a
kpatch-patch-4_18_0-477_107_1-debugsource-1-2.el8_8.x86_64.rpm SHA-256: 2f5c6af0ded500781ded4b969779ba627712ab2af4f9d44a8d35d7a787865f6b
kpatch-patch-4_18_0-477_120_1-1-1.el8_8.x86_64.rpm SHA-256: 28768e8b7bb1d8b96bba07b3e3ea63fa10bf74239bbbf0721d90abf6c7771460
kpatch-patch-4_18_0-477_120_1-debuginfo-1-1.el8_8.x86_64.rpm SHA-256: f2ff9259b12a500ba90c92e8e3b6ca3e9dd933f07d1458c7aeb2bfd64057d826
kpatch-patch-4_18_0-477_120_1-debugsource-1-1.el8_8.x86_64.rpm SHA-256: 8bafd4d32d3c8fb0cadfcf16490598843d81ab47ad8573f051a547215ce8c4b7
kpatch-patch-4_18_0-477_81_1-1-10.el8_8.x86_64.rpm SHA-256: 786fbafc3a4d9b383f07ef4c23b3193a97a001ccf9b00b1cf3adbc0d7bbdf89b
kpatch-patch-4_18_0-477_81_1-debuginfo-1-10.el8_8.x86_64.rpm SHA-256: edeb7bbc8e948fdb6bb21178dd99abaddd2bdc5dd2360033fc515574ec053f6c
kpatch-patch-4_18_0-477_81_1-debugsource-1-10.el8_8.x86_64.rpm SHA-256: 57223e608736bb195159460df3955368b89726cd8947fa49ed74b4caa6aeb4cc
kpatch-patch-4_18_0-477_89_1-1-8.el8_8.x86_64.rpm SHA-256: d17917ba15a3cc2b807dc9be431021ff52fd04724b82cfa229899857ec1c7b37
kpatch-patch-4_18_0-477_89_1-debuginfo-1-8.el8_8.x86_64.rpm SHA-256: 1fc9d78aa7db3f316cff1b8912660393d0c14354ce38251f50a5bdf5cd4e4280
kpatch-patch-4_18_0-477_89_1-debugsource-1-8.el8_8.x86_64.rpm SHA-256: fe1c6357a6ab64e6a3995616cbe022d807ea219b55b21a542ad9ea2490fc8b78
kpatch-patch-4_18_0-477_97_1-1-6.el8_8.x86_64.rpm SHA-256: 307d91d5f2facf6f85ae6526a1c753050476413a0b9764fb73bddf040ec8f5d2
kpatch-patch-4_18_0-477_97_1-debuginfo-1-6.el8_8.x86_64.rpm SHA-256: dd2d027c6ce7b0e3d8e98bfe4eca92e8e41173d262e6ddf6c07fae554db52ecc
kpatch-patch-4_18_0-477_97_1-debugsource-1-6.el8_8.x86_64.rpm SHA-256: 7d9db3ae23961c149660cd1b8b15c59068d5f8fb203993bed0e6c04d87519357

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8

SRPM
kpatch-patch-4_18_0-477_107_1-1-2.el8_8.src.rpm SHA-256: bf072e926db5f90e0762b0369453ad5459fc3db2d27ba50781b460da05ab2b72
kpatch-patch-4_18_0-477_120_1-1-1.el8_8.src.rpm SHA-256: c4249c1d711c3f9274e59455d207fce8c83f2a1c41316a96978c19653a7ab4dd
kpatch-patch-4_18_0-477_81_1-1-10.el8_8.src.rpm SHA-256: d0470dac62fef083ef32758667ccee9ff40455d432b86611778e1def4ce51868
kpatch-patch-4_18_0-477_89_1-1-8.el8_8.src.rpm SHA-256: f80e1418ae18cf6e9f62c1acde8430dbbb9ab3028ed057cc089f64ae084ea640
kpatch-patch-4_18_0-477_97_1-1-6.el8_8.src.rpm SHA-256: 5d316725474e00abc8a552ce698fbb9a8589241789aae0130773df5ed728b833
ppc64le
kpatch-patch-4_18_0-477_107_1-1-2.el8_8.ppc64le.rpm SHA-256: f755b15f6e69db8adc0a6a24e7b56613881d396f1d37e761bf393a9f3d0f140f
kpatch-patch-4_18_0-477_107_1-debuginfo-1-2.el8_8.ppc64le.rpm SHA-256: 667b8b9a70fde6bdbd569c276d9f3657808cd611b09c064d80f4b0de50990ad6
kpatch-patch-4_18_0-477_107_1-debugsource-1-2.el8_8.ppc64le.rpm SHA-256: 418e3ae5aae35c2ee4ea64b7bb5ce4b2335d3facd93583bfe60344edfe6e1c17
kpatch-patch-4_18_0-477_120_1-1-1.el8_8.ppc64le.rpm SHA-256: 5eb59c89c4dcdaeab2f5eca786fa04e11410829f0d3a1d75e9cafdaf4d7409ab
kpatch-patch-4_18_0-477_120_1-debuginfo-1-1.el8_8.ppc64le.rpm SHA-256: 65ce3d0411b85d51c76fda59a9b5fb5c51445ff757e6baf25bb9747ee8c49cea
kpatch-patch-4_18_0-477_120_1-debugsource-1-1.el8_8.ppc64le.rpm SHA-256: 2227252a13eb334c1ddc9f934a65f76a25e9894bdc97077bfdebec0503958df9
kpatch-patch-4_18_0-477_81_1-1-10.el8_8.ppc64le.rpm SHA-256: b14f5809519f91867696bc19422d6cb42780cc9ce916a2a2f41b66a696e50961
kpatch-patch-4_18_0-477_81_1-debuginfo-1-10.el8_8.ppc64le.rpm SHA-256: e8bdacda018a28a9629e3a2a5c88caa092358c8d026374f6550f4a485ddc4047
kpatch-patch-4_18_0-477_81_1-debugsource-1-10.el8_8.ppc64le.rpm SHA-256: 03e964c4c3a2fae481be7b82ad255b84333adbbdb371cf97e170a84797960d2d
kpatch-patch-4_18_0-477_89_1-1-8.el8_8.ppc64le.rpm SHA-256: 517a0366f6300409de34d5e69c63b3cbbe54696b80a1d84f64b77625fa530438
kpatch-patch-4_18_0-477_89_1-debuginfo-1-8.el8_8.ppc64le.rpm SHA-256: 3cb3333d9f43aaf1795198250d730dc47b4078725073638d582a309217ed2ae7
kpatch-patch-4_18_0-477_89_1-debugsource-1-8.el8_8.ppc64le.rpm SHA-256: 58768e4f9fdd27043387ddf154bf3b28a7322f8ca37011e6bbfa3e7f4cb9146b
kpatch-patch-4_18_0-477_97_1-1-6.el8_8.ppc64le.rpm SHA-256: b7a2baf316d78fffa388e5322535ab0449a9d9669eecba1e4b4e50bc40f840df
kpatch-patch-4_18_0-477_97_1-debuginfo-1-6.el8_8.ppc64le.rpm SHA-256: f1a40ce434183d8a379ff280fd81cea610b62ac72ade6954634f3ef7ef91cc07
kpatch-patch-4_18_0-477_97_1-debugsource-1-6.el8_8.ppc64le.rpm SHA-256: ef9c42cd8b5684f84180fd95f57d161c1d854dd921431d60a6461ecf79a5050d

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8

SRPM
kpatch-patch-4_18_0-477_107_1-1-2.el8_8.src.rpm SHA-256: bf072e926db5f90e0762b0369453ad5459fc3db2d27ba50781b460da05ab2b72
kpatch-patch-4_18_0-477_120_1-1-1.el8_8.src.rpm SHA-256: c4249c1d711c3f9274e59455d207fce8c83f2a1c41316a96978c19653a7ab4dd
kpatch-patch-4_18_0-477_81_1-1-10.el8_8.src.rpm SHA-256: d0470dac62fef083ef32758667ccee9ff40455d432b86611778e1def4ce51868
kpatch-patch-4_18_0-477_89_1-1-8.el8_8.src.rpm SHA-256: f80e1418ae18cf6e9f62c1acde8430dbbb9ab3028ed057cc089f64ae084ea640
kpatch-patch-4_18_0-477_97_1-1-6.el8_8.src.rpm SHA-256: 5d316725474e00abc8a552ce698fbb9a8589241789aae0130773df5ed728b833
x86_64
kpatch-patch-4_18_0-477_107_1-1-2.el8_8.x86_64.rpm SHA-256: 0cc77d9867fe33a8ebab1e5dcdb54489b3ec4fbadf4909ee5eecc94f0a7b096b
kpatch-patch-4_18_0-477_107_1-debuginfo-1-2.el8_8.x86_64.rpm SHA-256: 6d58b6ee9b8c09a7ed796c2db6ea965c59a8b1a39bd4163f6cc8079c357f538a
kpatch-patch-4_18_0-477_107_1-debugsource-1-2.el8_8.x86_64.rpm SHA-256: 2f5c6af0ded500781ded4b969779ba627712ab2af4f9d44a8d35d7a787865f6b
kpatch-patch-4_18_0-477_120_1-1-1.el8_8.x86_64.rpm SHA-256: 28768e8b7bb1d8b96bba07b3e3ea63fa10bf74239bbbf0721d90abf6c7771460
kpatch-patch-4_18_0-477_120_1-debuginfo-1-1.el8_8.x86_64.rpm SHA-256: f2ff9259b12a500ba90c92e8e3b6ca3e9dd933f07d1458c7aeb2bfd64057d826
kpatch-patch-4_18_0-477_120_1-debugsource-1-1.el8_8.x86_64.rpm SHA-256: 8bafd4d32d3c8fb0cadfcf16490598843d81ab47ad8573f051a547215ce8c4b7
kpatch-patch-4_18_0-477_81_1-1-10.el8_8.x86_64.rpm SHA-256: 786fbafc3a4d9b383f07ef4c23b3193a97a001ccf9b00b1cf3adbc0d7bbdf89b
kpatch-patch-4_18_0-477_81_1-debuginfo-1-10.el8_8.x86_64.rpm SHA-256: edeb7bbc8e948fdb6bb21178dd99abaddd2bdc5dd2360033fc515574ec053f6c
kpatch-patch-4_18_0-477_81_1-debugsource-1-10.el8_8.x86_64.rpm SHA-256: 57223e608736bb195159460df3955368b89726cd8947fa49ed74b4caa6aeb4cc
kpatch-patch-4_18_0-477_89_1-1-8.el8_8.x86_64.rpm SHA-256: d17917ba15a3cc2b807dc9be431021ff52fd04724b82cfa229899857ec1c7b37
kpatch-patch-4_18_0-477_89_1-debuginfo-1-8.el8_8.x86_64.rpm SHA-256: 1fc9d78aa7db3f316cff1b8912660393d0c14354ce38251f50a5bdf5cd4e4280
kpatch-patch-4_18_0-477_89_1-debugsource-1-8.el8_8.x86_64.rpm SHA-256: fe1c6357a6ab64e6a3995616cbe022d807ea219b55b21a542ad9ea2490fc8b78
kpatch-patch-4_18_0-477_97_1-1-6.el8_8.x86_64.rpm SHA-256: 307d91d5f2facf6f85ae6526a1c753050476413a0b9764fb73bddf040ec8f5d2
kpatch-patch-4_18_0-477_97_1-debuginfo-1-6.el8_8.x86_64.rpm SHA-256: dd2d027c6ce7b0e3d8e98bfe4eca92e8e41173d262e6ddf6c07fae554db52ecc
kpatch-patch-4_18_0-477_97_1-debugsource-1-6.el8_8.x86_64.rpm SHA-256: 7d9db3ae23961c149660cd1b8b15c59068d5f8fb203993bed0e6c04d87519357

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility