Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2005:165 - Security Advisory
Issued:
2005-06-08
Updated:
2005-06-08

RHSA-2005:165 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

rsh security update

Type/Severity

Security Advisory: Low

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated rsh packages that fix various bugs and a theoretical security issue
are now available.

This update has been rated as having low security impact by the Red Hat
Security Response Team

Description

The rsh package contains a set of programs that allow users to run
commands on remote machines, login to other machines, and copy files
between machines, using the rsh, rlogin, and rcp commands. All three of
these commands use rhosts-style authentication.

The rcp protocol allows a server to instruct a client to write to arbitrary
files outside of the current directory. This could potentially cause a
security issue if a user uses rcp to copy files from a malicious server.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2004-0175 to this issue.

These updated packages also address the following bugs:

The rlogind server reported "SIGCHLD set to SIG_IGN but calls wait()"
message to the system log because the original BSD code was ported
incorrectly to linux.

The rexecd server did not function on systems where client hostnames were
not in the DNS service, because server code called gethostbyaddr() for each
new connection.

The rcp command incorrectly used the "errno" variable and produced
erroneous error messages.

The rexecd command ignored settings in the /etc/security/limits file,
because the PAM session was incorrectly initialized.

All users of rsh should upgrade to these updated packages, which resolve
these issues.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

If up2date fails to connect to Red Hat Network due to SSL
Certificate Errors, you need to install a version of the
up2date client with an updated certificate. The latest version of
up2date is available from the Red Hat FTP site and may also be
downloaded directly from the RHN website:

https://rhn.redhat.com/help/latest-up2date.pxt

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc

Fixes

  • BZ - 146978 - RHEL4: rexecd does not set limits on /etc/security/limits
  • BZ - 146979 - RHEL4: rcp gives incorrect error report when file system writes fai

CVEs

  • CVE-2004-0175

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 4

SRPM
rsh-0.17-25.3.src.rpm SHA-256: 1ed910b7810e3a48d2a1047407fe44b67656a071ddf3a7ca0b559ae37869d78a
x86_64
rsh-0.17-25.3.x86_64.rpm SHA-256: cadc2ee9c2d9c0cca3a07c0ec885e70980c5cc1511287a9b5e98ea163bd5faa9
rsh-0.17-25.3.x86_64.rpm SHA-256: cadc2ee9c2d9c0cca3a07c0ec885e70980c5cc1511287a9b5e98ea163bd5faa9
rsh-server-0.17-25.3.x86_64.rpm SHA-256: c301afb59c7bb0ec914a108cf02388fe530903c4cc0624f6ab589d35725f9a66
rsh-server-0.17-25.3.x86_64.rpm SHA-256: c301afb59c7bb0ec914a108cf02388fe530903c4cc0624f6ab589d35725f9a66
ia64
rsh-0.17-25.3.ia64.rpm SHA-256: 6ab5b728be24527b508eb6bdc238638d28ed8b3afb2729cbf66f6ae34f708572
rsh-0.17-25.3.ia64.rpm SHA-256: 6ab5b728be24527b508eb6bdc238638d28ed8b3afb2729cbf66f6ae34f708572
rsh-server-0.17-25.3.ia64.rpm SHA-256: 7fbef9566c918e24ef6b786a1080c314512b073c67f4e1a23cf157948b3c1a39
rsh-server-0.17-25.3.ia64.rpm SHA-256: 7fbef9566c918e24ef6b786a1080c314512b073c67f4e1a23cf157948b3c1a39
i386
rsh-0.17-25.3.i386.rpm SHA-256: a0fe8ff2e43288a8a588a3776f925f73ecd492aea9da2d7aebb74c48dfcb0e59
rsh-0.17-25.3.i386.rpm SHA-256: a0fe8ff2e43288a8a588a3776f925f73ecd492aea9da2d7aebb74c48dfcb0e59
rsh-server-0.17-25.3.i386.rpm SHA-256: 9328326bf13a4c52e7971bbceb56bcd4e105c1e855facf420856164c05ae5255
rsh-server-0.17-25.3.i386.rpm SHA-256: 9328326bf13a4c52e7971bbceb56bcd4e105c1e855facf420856164c05ae5255

Red Hat Enterprise Linux Workstation 4

SRPM
rsh-0.17-25.3.src.rpm SHA-256: 1ed910b7810e3a48d2a1047407fe44b67656a071ddf3a7ca0b559ae37869d78a
x86_64
rsh-0.17-25.3.x86_64.rpm SHA-256: cadc2ee9c2d9c0cca3a07c0ec885e70980c5cc1511287a9b5e98ea163bd5faa9
rsh-server-0.17-25.3.x86_64.rpm SHA-256: c301afb59c7bb0ec914a108cf02388fe530903c4cc0624f6ab589d35725f9a66
ia64
rsh-0.17-25.3.ia64.rpm SHA-256: 6ab5b728be24527b508eb6bdc238638d28ed8b3afb2729cbf66f6ae34f708572
rsh-server-0.17-25.3.ia64.rpm SHA-256: 7fbef9566c918e24ef6b786a1080c314512b073c67f4e1a23cf157948b3c1a39
i386
rsh-0.17-25.3.i386.rpm SHA-256: a0fe8ff2e43288a8a588a3776f925f73ecd492aea9da2d7aebb74c48dfcb0e59
rsh-server-0.17-25.3.i386.rpm SHA-256: 9328326bf13a4c52e7971bbceb56bcd4e105c1e855facf420856164c05ae5255

Red Hat Enterprise Linux Desktop 4

SRPM
rsh-0.17-25.3.src.rpm SHA-256: 1ed910b7810e3a48d2a1047407fe44b67656a071ddf3a7ca0b559ae37869d78a
x86_64
rsh-0.17-25.3.x86_64.rpm SHA-256: cadc2ee9c2d9c0cca3a07c0ec885e70980c5cc1511287a9b5e98ea163bd5faa9
rsh-server-0.17-25.3.x86_64.rpm SHA-256: c301afb59c7bb0ec914a108cf02388fe530903c4cc0624f6ab589d35725f9a66
i386
rsh-0.17-25.3.i386.rpm SHA-256: a0fe8ff2e43288a8a588a3776f925f73ecd492aea9da2d7aebb74c48dfcb0e59
rsh-server-0.17-25.3.i386.rpm SHA-256: 9328326bf13a4c52e7971bbceb56bcd4e105c1e855facf420856164c05ae5255

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
rsh-0.17-25.3.src.rpm SHA-256: 1ed910b7810e3a48d2a1047407fe44b67656a071ddf3a7ca0b559ae37869d78a
s390x
rsh-0.17-25.3.s390x.rpm SHA-256: 8e3464b3b7186847f8bb1990ed2978b61357641373a43ec855662c24d5104d4c
rsh-server-0.17-25.3.s390x.rpm SHA-256: f188a97ff9864132c06f5af2c561e356b87ad5ed5dd5fe590dc854d8d6a9ea28
s390
rsh-0.17-25.3.s390.rpm SHA-256: 18bb08a21252691bc344efbd71d541a07bdeb1a1e23b9284fe6d6f9e8d24c8a2
rsh-server-0.17-25.3.s390.rpm SHA-256: 14bd9c62ea000cd65fd3c3eb0619be4e6733658f14e447cccf238894d6af643c

Red Hat Enterprise Linux for Power, big endian 4

SRPM
rsh-0.17-25.3.src.rpm SHA-256: 1ed910b7810e3a48d2a1047407fe44b67656a071ddf3a7ca0b559ae37869d78a
ppc
rsh-0.17-25.3.ppc.rpm SHA-256: fdbbedd9c4d8c26f53f6324afb45d1c82aa40caf4afb7770c7d5b5abea33c605
rsh-server-0.17-25.3.ppc.rpm SHA-256: 4c8b452cae14c4fc909879a48a749988eb21d6ba546b248119f327101dbef602

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility