Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2026:2558 - Security Advisory
Issued:
2026-02-11
Updated:
2026-02-11

RHSA-2026:2558 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kpatch-patch-4_18_0-372_131_1, kpatch-patch-4_18_0-372_137_1, kpatch-patch-4_18_0-372_145_1, kpatch-patch-4_18_0-372_158_1, and kpatch-patch-4_18_0-372_170_1 security update

Type/Severity

Security Advisory: Moderate

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for multiple packages is now available for Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

This is a kernel live patch module which can be loaded by the kpatch command line utility to modify the code of a running kernel. This patch module is targeted for kernel-4.18.0-372.131.1.el8_6.

Security Fix(es):

  • kernel: libceph: fix potential use-after-free in have_mon_and_osd_map() (CVE-2025-68285)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.6 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64

Fixes

  • BZ - 2422801 - CVE-2025-68285 kernel: libceph: fix potential use-after-free in have_mon_and_osd_map()

CVEs

  • CVE-2025-68285

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.6

SRPM
kpatch-patch-4_18_0-372_131_1-1-11.el8_6.src.rpm SHA-256: b041860e2da42be753ec9d0c8bcabeab066bcb72445ed5303fa05a4891367a7c
kpatch-patch-4_18_0-372_137_1-1-8.el8_6.src.rpm SHA-256: 0f04833e7e21d81fed3fe720428b0d186a32beb527857bc2e2ddfdd1e46668db
kpatch-patch-4_18_0-372_145_1-1-6.el8_6.src.rpm SHA-256: 34a095f00dad99a391f08b8112e3c940b67464c149072c1b86017c4348172b6d
kpatch-patch-4_18_0-372_158_1-1-2.el8_6.src.rpm SHA-256: b210dc6a86a50f94c5095333aa3bbfa8d85e3b99308c84b92b6b686e88394d8c
kpatch-patch-4_18_0-372_170_1-1-1.el8_6.src.rpm SHA-256: 2b5b67c9b7c6b0c5a8adbabb114978032fbe63bf8349afc071045abe164ba3ce
x86_64
kpatch-patch-4_18_0-372_131_1-1-11.el8_6.x86_64.rpm SHA-256: 9d40ebd933e7f5bf691c8e470732679f3b72e0358b59953b542f37ef9705432a
kpatch-patch-4_18_0-372_131_1-debuginfo-1-11.el8_6.x86_64.rpm SHA-256: 985b1d46b0b97e59ef99cbe13fcce45174a741c1f4b7351230b61fd98ffb6388
kpatch-patch-4_18_0-372_131_1-debugsource-1-11.el8_6.x86_64.rpm SHA-256: 08fbb303c836eec9fc7ded836857196164c2d656394c355330871c8f687c85c0
kpatch-patch-4_18_0-372_137_1-1-8.el8_6.x86_64.rpm SHA-256: 562297040cdd2f5da7387e1db758ab5b293805ea8dde390acd266f98053813e4
kpatch-patch-4_18_0-372_137_1-debuginfo-1-8.el8_6.x86_64.rpm SHA-256: 0bea0d3a99be210b6ca962db66ab6877c01e4bf68e32287a4c77c00ce93c3013
kpatch-patch-4_18_0-372_137_1-debugsource-1-8.el8_6.x86_64.rpm SHA-256: c13dad6db270810d4061a55eaf506225e2bce8227daef04c8ff4d7bda0baf998
kpatch-patch-4_18_0-372_145_1-1-6.el8_6.x86_64.rpm SHA-256: 2ad80f3f2a1dd6cc14af35f491bacca75b42dc91f69b830493f1f0939df08f95
kpatch-patch-4_18_0-372_145_1-debuginfo-1-6.el8_6.x86_64.rpm SHA-256: 14884ab58d955efba63a0c7541bd7465da079a130f694d77f851e358f96831c0
kpatch-patch-4_18_0-372_145_1-debugsource-1-6.el8_6.x86_64.rpm SHA-256: 5a6d38657ec78a2846ced8000d5171f2a08d5d64e82f5614f9c9619cd66360fa
kpatch-patch-4_18_0-372_158_1-1-2.el8_6.x86_64.rpm SHA-256: a4515e345a219f2ca28026a5d734b2ec39a3cbb52cd61aa2de49afac5a226393
kpatch-patch-4_18_0-372_158_1-debuginfo-1-2.el8_6.x86_64.rpm SHA-256: 5630d8b2b79b01d8de39ff6676f6c43af558ded5d05ee63dcbefef12970f2d3e
kpatch-patch-4_18_0-372_158_1-debugsource-1-2.el8_6.x86_64.rpm SHA-256: 93234cf0f8e716fcc265767002d58f58fab119051dbd080361f098efda998e6e
kpatch-patch-4_18_0-372_170_1-1-1.el8_6.x86_64.rpm SHA-256: 0ba3c6dc326cc2cf64b2e673edc37b7486548b1b035a1c90ef8896b3b1182d9e
kpatch-patch-4_18_0-372_170_1-debuginfo-1-1.el8_6.x86_64.rpm SHA-256: 36ed23380a6a8b91ff8357bb6fe63ab881dc00a0290f7cd26de1c25e1cc89b5b
kpatch-patch-4_18_0-372_170_1-debugsource-1-1.el8_6.x86_64.rpm SHA-256: e26f42de5a3897950ce5d6698b7d4e2bba2d26fe6178ca67acf96a7cfe3a5f17

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6

SRPM
kpatch-patch-4_18_0-372_131_1-1-11.el8_6.src.rpm SHA-256: b041860e2da42be753ec9d0c8bcabeab066bcb72445ed5303fa05a4891367a7c
kpatch-patch-4_18_0-372_137_1-1-8.el8_6.src.rpm SHA-256: 0f04833e7e21d81fed3fe720428b0d186a32beb527857bc2e2ddfdd1e46668db
kpatch-patch-4_18_0-372_145_1-1-6.el8_6.src.rpm SHA-256: 34a095f00dad99a391f08b8112e3c940b67464c149072c1b86017c4348172b6d
kpatch-patch-4_18_0-372_158_1-1-2.el8_6.src.rpm SHA-256: b210dc6a86a50f94c5095333aa3bbfa8d85e3b99308c84b92b6b686e88394d8c
kpatch-patch-4_18_0-372_170_1-1-1.el8_6.src.rpm SHA-256: 2b5b67c9b7c6b0c5a8adbabb114978032fbe63bf8349afc071045abe164ba3ce
ppc64le
kpatch-patch-4_18_0-372_131_1-1-11.el8_6.ppc64le.rpm SHA-256: 721f87cf97bf4d3921bebc70e7d491de79315a2bd1191298452316cf7f69f61d
kpatch-patch-4_18_0-372_131_1-debuginfo-1-11.el8_6.ppc64le.rpm SHA-256: 1412d789d0563e806d05bfaf61305c1528d7a1c2dde29f2d061708cf9633b75c
kpatch-patch-4_18_0-372_131_1-debugsource-1-11.el8_6.ppc64le.rpm SHA-256: ca5c8f549e5ec8b7d8c903444cdff757fc090f8ab4374d23f77033cbac550792
kpatch-patch-4_18_0-372_137_1-1-8.el8_6.ppc64le.rpm SHA-256: 128bc860d1332150e54a1ca1144cbfa0440b1a3e8387782ab912eef5ad704fc5
kpatch-patch-4_18_0-372_137_1-debuginfo-1-8.el8_6.ppc64le.rpm SHA-256: e2d38a33966b4b45999b30c68ef475237b9a24954a0fc2ac0874908aa5da702b
kpatch-patch-4_18_0-372_137_1-debugsource-1-8.el8_6.ppc64le.rpm SHA-256: 22f5c01165b52c60bc17d6013e0b31260f8cd384a8998e408a04ccac795a1a6c
kpatch-patch-4_18_0-372_145_1-1-6.el8_6.ppc64le.rpm SHA-256: 0b0bae687eb99f0d48d3cfed23894ed969b5fa1ed3b363a29507d51943debd1d
kpatch-patch-4_18_0-372_145_1-debuginfo-1-6.el8_6.ppc64le.rpm SHA-256: 62e5741a0af901ec968d1e0c8aa898eb3e41319ae0295cb31328ab619377c3e4
kpatch-patch-4_18_0-372_145_1-debugsource-1-6.el8_6.ppc64le.rpm SHA-256: 0117d88d5a2e865b26bc648df41694dfe3c6fef28069b5b494fe16de6dd29fbc
kpatch-patch-4_18_0-372_158_1-1-2.el8_6.ppc64le.rpm SHA-256: 4b0e16a8f3b3190df099fed22beaa9149a64af020198b212440f4e725faf21ac
kpatch-patch-4_18_0-372_158_1-debuginfo-1-2.el8_6.ppc64le.rpm SHA-256: d20c6a0385f01f1a82f3a7078ebc14d15fad4b709ee00031e1adb05e76a03e29
kpatch-patch-4_18_0-372_158_1-debugsource-1-2.el8_6.ppc64le.rpm SHA-256: b1277667385744d901e14a4afc29f8f4601cb17a147a2596d4516df322662242
kpatch-patch-4_18_0-372_170_1-1-1.el8_6.ppc64le.rpm SHA-256: e45cc063029d4d0cd37d2d8e3b2f4d5c9e5a595f4c315002673dc9fb7f909b23
kpatch-patch-4_18_0-372_170_1-debuginfo-1-1.el8_6.ppc64le.rpm SHA-256: 3d4f2c4c960af630684b1249877daadae381f04e7287c520fd906a6f06e3c217
kpatch-patch-4_18_0-372_170_1-debugsource-1-1.el8_6.ppc64le.rpm SHA-256: 908f989f84052c8715f5a296336c1e28ad1285f55cebca50b734ef90f4d7479b

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6

SRPM
kpatch-patch-4_18_0-372_131_1-1-11.el8_6.src.rpm SHA-256: b041860e2da42be753ec9d0c8bcabeab066bcb72445ed5303fa05a4891367a7c
kpatch-patch-4_18_0-372_137_1-1-8.el8_6.src.rpm SHA-256: 0f04833e7e21d81fed3fe720428b0d186a32beb527857bc2e2ddfdd1e46668db
kpatch-patch-4_18_0-372_145_1-1-6.el8_6.src.rpm SHA-256: 34a095f00dad99a391f08b8112e3c940b67464c149072c1b86017c4348172b6d
kpatch-patch-4_18_0-372_158_1-1-2.el8_6.src.rpm SHA-256: b210dc6a86a50f94c5095333aa3bbfa8d85e3b99308c84b92b6b686e88394d8c
kpatch-patch-4_18_0-372_170_1-1-1.el8_6.src.rpm SHA-256: 2b5b67c9b7c6b0c5a8adbabb114978032fbe63bf8349afc071045abe164ba3ce
x86_64
kpatch-patch-4_18_0-372_131_1-1-11.el8_6.x86_64.rpm SHA-256: 9d40ebd933e7f5bf691c8e470732679f3b72e0358b59953b542f37ef9705432a
kpatch-patch-4_18_0-372_131_1-debuginfo-1-11.el8_6.x86_64.rpm SHA-256: 985b1d46b0b97e59ef99cbe13fcce45174a741c1f4b7351230b61fd98ffb6388
kpatch-patch-4_18_0-372_131_1-debugsource-1-11.el8_6.x86_64.rpm SHA-256: 08fbb303c836eec9fc7ded836857196164c2d656394c355330871c8f687c85c0
kpatch-patch-4_18_0-372_137_1-1-8.el8_6.x86_64.rpm SHA-256: 562297040cdd2f5da7387e1db758ab5b293805ea8dde390acd266f98053813e4
kpatch-patch-4_18_0-372_137_1-debuginfo-1-8.el8_6.x86_64.rpm SHA-256: 0bea0d3a99be210b6ca962db66ab6877c01e4bf68e32287a4c77c00ce93c3013
kpatch-patch-4_18_0-372_137_1-debugsource-1-8.el8_6.x86_64.rpm SHA-256: c13dad6db270810d4061a55eaf506225e2bce8227daef04c8ff4d7bda0baf998
kpatch-patch-4_18_0-372_145_1-1-6.el8_6.x86_64.rpm SHA-256: 2ad80f3f2a1dd6cc14af35f491bacca75b42dc91f69b830493f1f0939df08f95
kpatch-patch-4_18_0-372_145_1-debuginfo-1-6.el8_6.x86_64.rpm SHA-256: 14884ab58d955efba63a0c7541bd7465da079a130f694d77f851e358f96831c0
kpatch-patch-4_18_0-372_145_1-debugsource-1-6.el8_6.x86_64.rpm SHA-256: 5a6d38657ec78a2846ced8000d5171f2a08d5d64e82f5614f9c9619cd66360fa
kpatch-patch-4_18_0-372_158_1-1-2.el8_6.x86_64.rpm SHA-256: a4515e345a219f2ca28026a5d734b2ec39a3cbb52cd61aa2de49afac5a226393
kpatch-patch-4_18_0-372_158_1-debuginfo-1-2.el8_6.x86_64.rpm SHA-256: 5630d8b2b79b01d8de39ff6676f6c43af558ded5d05ee63dcbefef12970f2d3e
kpatch-patch-4_18_0-372_158_1-debugsource-1-2.el8_6.x86_64.rpm SHA-256: 93234cf0f8e716fcc265767002d58f58fab119051dbd080361f098efda998e6e
kpatch-patch-4_18_0-372_170_1-1-1.el8_6.x86_64.rpm SHA-256: 0ba3c6dc326cc2cf64b2e673edc37b7486548b1b035a1c90ef8896b3b1182d9e
kpatch-patch-4_18_0-372_170_1-debuginfo-1-1.el8_6.x86_64.rpm SHA-256: 36ed23380a6a8b91ff8357bb6fe63ab881dc00a0290f7cd26de1c25e1cc89b5b
kpatch-patch-4_18_0-372_170_1-debugsource-1-1.el8_6.x86_64.rpm SHA-256: e26f42de5a3897950ce5d6698b7d4e2bba2d26fe6178ca67acf96a7cfe3a5f17

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility