No, it's a immediate value. pushq pushes a value onto the stack, which may be a register, but you'll find they're denoted by operands like %rbx.
The $0x1a is an immediate value - you can tell this also by the length of that instruction (five bytes, from x+6 to x+10). The pushq instruction is capable of pushing a register, a memory content (64 bits) or a 32-bit immediate value (sign extended to 64 bits).
In this case, the five bytes are the opcode 0x68 along with the 32-bit value to push. If you were to examine the memory, it would probably look like 0x68 0x1a 0x00 0x00 0x00.
And don't be fooled by that code, it's not the "real" read call at all. It's a stub used to fix up references at runtime where code sections may be shared amongst processors, even at different base addresses.
The PLT is a small-footprint per-process stub which jumps to the real shared code the first time, fixing itself up in the process, so as to jump directly there in future. See here for an explanation of this process.