Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2014:1513 - Bug Fix Advisory
Issued:
2014-10-13
Updated:
2014-10-13

RHBA-2014:1513 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

virt-who bug fix and enhancement update

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated virt-who package that fixes several bugs and adds various enhancements
is now available for Red Hat Enterprise Linux 6.

Description

The virt-who package provides an agent that collects information about virtual
guests present in the system and reports them to the Red Hat Subscription
Manager tool.

The virt-who package has been upgraded to upstream version 0.10, which provides
a number of bug fixes and enhancements over the previous version. This update
includes support for multiple vCenter servers, fixed querying by cluster in
large ESX environments, corrected communication with Red Hat Satellite server
when ESXi has no host, fixed unregistering from Subscription Asset Manager (SAM)
server, fixed bug in Virtual Desktop and Server Management (VDSM) mode, support
for encrypted credentials, and fixed error when creating new VMs. (BZ#1002640,
BZ#994575, BZ#1002447, BZ#1009230, BZ#1011877, BZ#1017056, BZ#1081286,
BZ#1082416)

This update also fixes the following bugs:

  • Previously, the virt-who daemon did not report guest attributes to the server,

which disabled the virt_guest_limit feature. With this update, virt-who has been
modified to correctly report guest attributes. As a result, virt_guest_limit is
now supported by virt-who. (BZ#1098019)

  • Prior to this update, every call to Libvirtd.listDomains() function from the

/usr/share/virt-who/virt/libvirtd/libvirtd.py script opened a new connection to
the libvirtd daemon but did not close it. Consequently, after several
iterations, virt-who consumed all connections allowed for any client of
libvirtd. With this update, Libvirtd.listDomains() has been modified to properly
close the livirtd connections, thus fixing this bug. (BZ#1113938)

Users of virt-who are advised to upgrade to this updated package, which fixes
these bugs and add these enhancements.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux for IBM z Systems 6 s390x
  • Red Hat Enterprise Linux for Power, big endian 6 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6 s390x

Fixes

  • BZ - 1002447 - virt-who failed to send host/guest info to Satellite when ESXi have no host at all
  • BZ - 1009230 - Unregister to the SAM server will result in virt-who dead
  • BZ - 1011877 - Increase log level of "Sending update ..." log entry to INFO
  • BZ - 1017056 - virt-who can't work in the VDSM mode
  • BZ - 1082416 - On RHEL6, virt-who crashes with VirtError message when create new VM
  • BZ - 1098019 - Virt-who should report guest attributes in order to support virt-guest-limit feature
  • BZ - 1113938 - error : virNetServerAddClient:270
  • BZ - 1123723 - Virt-who failed to run at hyperv mode and esx mode
  • BZ - 1125810 - virt-who show "TypeError" when it run at libvirtd mode
  • BZ - 1126295 - "Cannot read VM list from ESX" when add vm to esx
  • BZ - 1126302 - Remove "DeprecationWarning" message when virt-who run at non-background mode
  • BZ - 1135341 - virt-who shows "TypeError" when it runs in VDSM and RHEVM mode
  • BZ - 1139497 - Failed to run at vdsm mode when it has guest on host

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 6

SRPM
virt-who-0.10-8.el6.src.rpm SHA-256: 8499763648aa1628920e9476259cc49a1f682647eaf68df4abadfa4d4179d343
x86_64
virt-who-0.10-8.el6.noarch.rpm SHA-256: c61b1d63f68447e52e4c9e14c2443360b3de7dc9c214a4c526bda30484c66954
virt-who-0.10-8.el6.noarch.rpm SHA-256: c61b1d63f68447e52e4c9e14c2443360b3de7dc9c214a4c526bda30484c66954
i386
virt-who-0.10-8.el6.noarch.rpm SHA-256: c61b1d63f68447e52e4c9e14c2443360b3de7dc9c214a4c526bda30484c66954

Red Hat Enterprise Linux Server - Extended Life Cycle Support 6

SRPM
virt-who-0.10-8.el6.src.rpm SHA-256: 8499763648aa1628920e9476259cc49a1f682647eaf68df4abadfa4d4179d343
x86_64
virt-who-0.10-8.el6.noarch.rpm SHA-256: c61b1d63f68447e52e4c9e14c2443360b3de7dc9c214a4c526bda30484c66954
i386
virt-who-0.10-8.el6.noarch.rpm SHA-256: c61b1d63f68447e52e4c9e14c2443360b3de7dc9c214a4c526bda30484c66954

Red Hat Enterprise Linux Workstation 6

SRPM
virt-who-0.10-8.el6.src.rpm SHA-256: 8499763648aa1628920e9476259cc49a1f682647eaf68df4abadfa4d4179d343
x86_64
virt-who-0.10-8.el6.noarch.rpm SHA-256: c61b1d63f68447e52e4c9e14c2443360b3de7dc9c214a4c526bda30484c66954
i386
virt-who-0.10-8.el6.noarch.rpm SHA-256: c61b1d63f68447e52e4c9e14c2443360b3de7dc9c214a4c526bda30484c66954

Red Hat Enterprise Linux Desktop 6

SRPM
virt-who-0.10-8.el6.src.rpm SHA-256: 8499763648aa1628920e9476259cc49a1f682647eaf68df4abadfa4d4179d343
x86_64
virt-who-0.10-8.el6.noarch.rpm SHA-256: c61b1d63f68447e52e4c9e14c2443360b3de7dc9c214a4c526bda30484c66954
i386
virt-who-0.10-8.el6.noarch.rpm SHA-256: c61b1d63f68447e52e4c9e14c2443360b3de7dc9c214a4c526bda30484c66954

Red Hat Enterprise Linux for IBM z Systems 6

SRPM
virt-who-0.10-8.el6.src.rpm SHA-256: 8499763648aa1628920e9476259cc49a1f682647eaf68df4abadfa4d4179d343
s390x
virt-who-0.10-8.el6.noarch.rpm SHA-256: c61b1d63f68447e52e4c9e14c2443360b3de7dc9c214a4c526bda30484c66954

Red Hat Enterprise Linux for Power, big endian 6

SRPM
virt-who-0.10-8.el6.src.rpm SHA-256: 8499763648aa1628920e9476259cc49a1f682647eaf68df4abadfa4d4179d343
ppc64
virt-who-0.10-8.el6.noarch.rpm SHA-256: c61b1d63f68447e52e4c9e14c2443360b3de7dc9c214a4c526bda30484c66954

Red Hat Enterprise Linux for Scientific Computing 6

SRPM
virt-who-0.10-8.el6.src.rpm SHA-256: 8499763648aa1628920e9476259cc49a1f682647eaf68df4abadfa4d4179d343
x86_64
virt-who-0.10-8.el6.noarch.rpm SHA-256: c61b1d63f68447e52e4c9e14c2443360b3de7dc9c214a4c526bda30484c66954

Red Hat Enterprise Linux Server from RHUI 6

SRPM
virt-who-0.10-8.el6.src.rpm SHA-256: 8499763648aa1628920e9476259cc49a1f682647eaf68df4abadfa4d4179d343
x86_64
virt-who-0.10-8.el6.noarch.rpm SHA-256: c61b1d63f68447e52e4c9e14c2443360b3de7dc9c214a4c526bda30484c66954
i386
virt-who-0.10-8.el6.noarch.rpm SHA-256: c61b1d63f68447e52e4c9e14c2443360b3de7dc9c214a4c526bda30484c66954

Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6

SRPM
virt-who-0.10-8.el6.src.rpm SHA-256: 8499763648aa1628920e9476259cc49a1f682647eaf68df4abadfa4d4179d343
s390x
virt-who-0.10-8.el6.noarch.rpm SHA-256: c61b1d63f68447e52e4c9e14c2443360b3de7dc9c214a4c526bda30484c66954

Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6

SRPM
virt-who-0.10-8.el6.src.rpm SHA-256: 8499763648aa1628920e9476259cc49a1f682647eaf68df4abadfa4d4179d343
x86_64
virt-who-0.10-8.el6.noarch.rpm SHA-256: c61b1d63f68447e52e4c9e14c2443360b3de7dc9c214a4c526bda30484c66954
i386
virt-who-0.10-8.el6.noarch.rpm SHA-256: c61b1d63f68447e52e4c9e14c2443360b3de7dc9c214a4c526bda30484c66954

Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6

SRPM
virt-who-0.10-8.el6.src.rpm SHA-256: 8499763648aa1628920e9476259cc49a1f682647eaf68df4abadfa4d4179d343
s390x
virt-who-0.10-8.el6.noarch.rpm SHA-256: c61b1d63f68447e52e4c9e14c2443360b3de7dc9c214a4c526bda30484c66954

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat X (formerly Twitter)

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility