What's new and changed in watsonx.ai
watsonx.ai updates can include new features and fixes. Releases are listed in reverse chronological order so that the latest release is at the beginning of the topic.
You can see a list of the new features for the platform and all of the services at What's new in IBM Software Hub.
Installing or upgrading watsonx.ai
Ready to install or upgrade watsonx.ai?
- To install watsonx.ai along with the other IBM® Software Hub services, see Installing IBM Software Hub.
- To upgrade watsonx.ai along with the other IBM Software Hub services, see Upgrading IBM Software Hub.
- To install or upgrade watsonx.ai
independently, see watsonx.ai.Remember: All of the IBM Software Hub components associated with an instance of IBM Software Hub must be installed at the same version.
IBM Software Hub Version 5.1.2
A new version of watsonx.ai was released in March 2025 with IBM Software Hub 5.1.2.
Operand version: 10.2.0
This release includes the following changes:
- New features
-
This release of watsonx.ai includes the following features:
- Work with new foundation models in Prompt Lab
- You can now use the following foundation models for inferencing from the API and from the
Prompt Lab in watsonx.ai:
granite-3-2-8b-instruct
granite-vision-3-2-2b
mistral-small-24b-instruct-2501
For details, see Foundation models in watsonx.ai.
- Deploy custom foundation models globally
- Administrators can now deploy custom foundation models globally by using the watsonx.ai Inference Framework Manager (IFM)
operator, which makes these models available for use in all projects and deployment spaces. Globally
deployed models enable administrators to centrally manage and deploy custom models, while providing
data scientists and AI builders with access to these models across multiple projects and spaces.
These models can then be used for creating and deploying structured or freeform prompt templates in
all projects and spaces, and can be used for text generation or inferencing.
To learn more about register custom foundation models for global deployment, see Registering custom foundation models for global deployment.
- Enhanced interaction with deployed custom foundation models through chat API
- You can now interact with your deployed custom foundation models through chat API. Chatting with a deployed custom foundation model provides you with a more natural and intuitive way to interact with the model, making it easier to ask questions, receive answers, and complete tasks. You can use the chat API to interact with your model for use cases such as customer service, language translation, and content generation to drive business value and improve user satisfaction.
- Train, deploy, and inference custom foundation models that are fine-tuned with PEFT techniques
- You can now train, deploy, inference, and manage your custom foundation models that are fine-tuned with Parameter-Efficient Fine-Tuning (PEFT) techniques in a more flexible way. By deploying non-quantized (LoRA) or quantized (QLoRA) models using PEFT techniques, you can save resources while taking advantage of the flexibility and customization options provided by using a custom foundation model.
- Streamlined deployment for AutoAI for RAG experiments
- From the AutoAI user interface, you can now save and deploy a RAG pattern as an AI service so that you can easily access the inferencing endpoint and test the pattern. This feature is available for RAG patterns developed using either the in-memory Chroma database or a Milvus database.
To read more about these features, see What's new and changed in watsonx.ai in the IBM watsonx™ documentation.
- Updates
- The following updates were introduced in this release:
- Deploy foundation models on a specific GPU in a cluster with different GPU types
- You can now deploy foundation models on a specific GPU type in a cluster that contains cluster
nodes with different GPU types by setting the node selector attribute in your deployment.
For details, see Adding foundation models in watsonx.ai.
- Install watsonx.ai with VMware vSphere
- You can now install the IBM watsonx.ai service on the VMware
vSphere platform with GPUs configured in
passthrough mode.
For details, see Foundation models in watsonx.ai.
- Issues fixed in this release
- The following issues were fixed in this release:
- The codestral-2501 foundation model is not removed after being uninstalled
-
- Issue: After you follow the instructions to remove the codestral-2501 foundation model from your deployment, the model remains on your cluster.
- Resolution: The codestral-2501 model is now removed after it is uninstalled.
- Customer-reported issues fixed in this release
- For a list of customer-reported issues that were fixed in this release, see the Fix List for IBM Cloud Pak® for Data on the IBM Support website.
- Security issues fixed in this release
- The following security issues were fixed in this release:
CVE-2025-0426, CVE-2025-22866, CVE-2025-22869
CVE-2024-3661, CVE-2024-6197, CVE-2024-6501, CVE-2024-9143, CVE-2024-11392, CVE-2024-11393, CVE-2024-11394, CVE-2024-45336, CVE-2024-45338, CVE-2024-45490, CVE-2024-52531
CVE-2023-27535, CVE-2023-27536, CVE-2023-27538, CVE-2023-44487, CVE-2023-52425
CVE-2022-1271, CVE-2022-40897
CVE-2021-22922, CVE-2021-22923
CVE-2020-11023
CVE-2019-3822, CVE-2019-3823, CVE-2019-5436, CVE-2019-11068, CVE-2019-13117, CVE-2019-13118
CVE-2018-0732, CVE-2018-0734, CVE-2018-0737, CVE-2018-16839, CVE-2018-16840, CVE-2018-16842
CVE-2017-0663, CVE-2017-3731, CVE-2017-3732, CVE-2017-3738, CVE-2017-7375, CVE-2017-9047, CVE-2017-9048, CVE-2017-18258
CVE-2016-0702, CVE-2016-0703, CVE-2016-0704, CVE-2016-0705, CVE-2016-0797, CVE-2016-0799, CVE-2016-1833, CVE-2016-1834, CVE-2016-1835, CVE-2016-1836, CVE-2016-1837, CVE-2016-1838, CVE-2016-1839, CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, CVE-2016-2108, CVE-2016-2109, CVE-2016-2178, CVE-2016-4447, CVE-2016-4448, CVE-2016-4449, CVE-2016-5131, CVE-2016-5419, CVE-2016-6302, CVE-2016-6306, CVE-2016-7056, CVE-2016-7141, CVE-2016-8610, CVE-2016-8615, CVE-2016-8616, CVE-2016-8617, CVE-2016-8618, CVE-2016-8619, CVE-2016-8621, CVE-2016-8622, CVE-2016-8623, CVE-2016-8624, CVE-2016-9318
CVE-2015-0204, CVE-2015-0205, CVE-2015-0206, CVE-2015-0209, CVE-2015-3194, CVE-2015-3195, CVE-2015-3196, CVE-2015-4000, CVE-2015-7497, CVE-2015-7941, CVE-2015-7942
- Deprecated features
- The following features were deprecated in this release:
- Deprecated foundation models
- The following models are now deprecated and will be withdrawn in a future release:
granite-8b-japanese
- Withdrawn foundation models
- The following models are now withdrawn from the watsonx.ai service:
codellama-34b-instruct-hf
granite-13b-chat-v2
granite-20b-multilingual
- Deprecation of Federated Learning
- Federated Learning is deprecated and will be removed in a future release.
For details, see Foundation model lifecycle.
IBM Software Hub Version 5.1.1
A new version of watsonx.ai was released in February 2025 with IBM Software Hub 5.1.1.
Operand version: 10.1.0
This release includes the following changes:
- New features
-
This release of watsonx.ai includes the following features:
- Save resources by training, deploying, and inferencing fine-tuned models with LoRA and QLoRA adapters
-
Fine tuning is the process of training a model on additional training data by updating the weights of the model, which results in a completely new model. Fine tuning is resource intensive process and normally requires you to have multiple GPUs due to memory requirements. To save resources, you can now use parameter-efficient fine tuning (PEFT) techniques such as low-rank adaptation (LoRA) and quantized low-rank adaptation (QLoRA) to train, deploy, and inference your fine-tuned models programmatically.
The following foundation models are now available for you to customize by using fine tuning techniques:
granite-3-1-8b-base
llama-3-1-8b
llama-3-1-70b
llama-3-1-70b-gptq
- Deploy generative AI applications with AI services
- You can now use AI services in watsonx.ai to deploy your applications. An AI service is a deployable unit of code that you can use to capture the logic of your generative AI use cases. While Python functions are the traditional way to deploy machine learning assets, AI services offer a more flexible option to deploy code for generative AI applications, such as streaming. When your AI services are successfully deployed, you can use the endpoint for inferencing from your application.
- Deploy and inference
DeepSeek-R1
distilled models with watsonx.ai for accelerated development - You can now use the distilled variants of
DeepSeek-R1
, a powerful open-sourced reasoning model, to securely deploy and inferenceDeepSeek-R1
models with watsonx.ai, which enabled you to accelerate the development of AI-powered solutions. TheDeepSeek-R1
model can be deployed as a custom foundation model with watsonx.ai. - Enhancements for AutoAI for RAG experiments
- These features for AutoAI RAG experiments
are new with this release:
- You can now add documents in for Markdown format for your document collections.
- You can exercise greater control over chunking settings for creating RAG patterns.
- Use either a standalone Milvus vector database or a Milvus database created with watsonx.ai for storing your indexed documents.
- Work with new foundation models in Prompt Lab
- You can now use the following foundation models for inferencing from the API and from the
Prompt Lab in watsonx.ai:
codestral-2501
llama-3-3-70b-instruct
mistral-large-instruct-2411
pixtral-large-instruct-2411
For details, see Foundation models in watsonx.ai.
- Work with new Granite embedding models for text matching and retrieval tasks
- You can now use the following embedding models to vectorize text in multiple languages:
granite-embedding-107m-multilingual-rtrvr
granite-embedding-278m-multilingual-rtrvr
For details, see Foundation models in watsonx.ai.
- Use IBM Granite time series foundation models and the watsonx.ai API to forecast future values
- Use the new time series API to pass historical data observations to an IBM Granite time series
foundation model that can forecast future values with zero-shot inferencing. You can now work with
the following time series models provided by IBM:
granite-ttm-512-96-r2
granite-ttm-1024-96-r2
granite-ttm-1536-96-r2
To read more about these features, see What's new and changed in watsonx.ai in the IBM watsonx documentation.
- Updates
- The following updates were introduced in this release:
- Use the text extraction API to process more file types, including files added directly in the API request body
- You can extract text from the following file types in addition to PDF files:
- GIF
- JPG
- PNG
- TIFF
- New versions of the Granite Instruct foundation models
- The
granite-3-2b-instruct
andgranite-3-8b-instruct
foundation models are updated to version 1.1.0. The latest modifications can handle larger prompts and provide better support for coding tasks. The context window length (input + output) for prompts is increased to 131,072 tokens. - New versions of the Granite Guardian foundation models
- The
granite-guardian-3-2b
andgranite-guardian-3-8b
foundation models are updated to version 1.1.0. The latest versions of the models are trained with additional synthetic data to improve performance for risks that are related to hallucination and jailbreak. The context window length (input + output) for prompts is increased to 131,072 tokens.
- Issues fixed in this release
- The following issues were fixed in this release:
- Duplicate file names generate an error when training an AutoAI RAG pattern
-
- Issue: The following message is generated during training:
AutoAI RAG experiment failed with: Not unique document file names passed in connections
. - Resolution: Remove any duplicate files or rename files with different content but the same file name before you run the experiment.
- Issue: The following message is generated during training:
- AutoAI RAG experiment can fail because too many tokens are submitted for some models
-
- Issue: If you are running an AutoAI
experiment for retrieval-augmented generation (RAG), the experiment might fail with this
error:
Failure during generate. (POST [Internal URL]\nStatus code: 400, body: {"errors":[{"code":"invalid_input_argument","message":"Invalid input argument for Model \'google/flan-ul2\': the number of input tokens 5601 cannot exceed the total tokens limit 4096 for this model
- Resolution: To resolve the issue, open the Experiment settings page
for the experiment and try these configuration changes:
- Deselect the smallest foundation model available for the experiment.
- Disable the window retrieval method.
- Issue: If you are running an AutoAI
experiment for retrieval-augmented generation (RAG), the experiment might fail with this
error:
- Customer-reported issues fixed in this release
- For a list of customer-reported issues that were fixed in this release, see the Fix List for IBM Cloud Pak for Data on the IBM Support website.
- Security issues fixed in this release
- The following security issues were fixed in this release:
CVE-2025-21502, CVE-2025-21613, CVE-2025-21614
CVE-2024-0340, CVE-2024-0397, CVE-2024-0443, CVE-2024-0444, CVE-2024-0450, CVE-2024-0564, CVE-2024-0607, CVE-2024-0639, CVE-2024-0641, CVE-2024-0727, CVE-2024-0775, CVE-2024-1151, CVE-2024-2236, CVE-2024-3056, CVE-2024-3177, CVE-2024-3568, CVE-2024-3596, CVE-2024-3651, CVE-2024-3661, CVE-2024-4032, CVE-2024-4453, CVE-2024-4603, CVE-2024-4741, CVE-2024-5187, CVE-2024-5321, CVE-2024-6119, CVE-2024-6232, CVE-2024-6239, CVE-2024-6345, CVE-2024-6501, CVE-2024-6602, CVE-2024-6655, CVE-2024-7006, CVE-2024-7347, CVE-2024-7531, CVE-2024-7592, CVE-2024-8088,CVE-2024-9287, CVE-2024-10041, CVE-2024-10220, CVE-2024-10963, CVE-2024-11079, CVE-2024-11168, CVE-2024-12254, CVE-2024-12798, CVE-2024-12801, CVE-2024-21068, CVE-2024-21538, CVE-2024-21823, CVE-2024-22099, CVE-2024-22667, CVE-2024-23196, CVE-2024-23254, CVE-2024-23263, CVE-2024-23280, CVE-2024-23284, CVE-2024-23307, CVE-2024-23848, CVE-2024-24789, CVE-2024-24855, CVE-2024-24857, CVE-2024-24858, CVE-2024-24859, CVE-2024-25062, CVE-2024-25260, CVE-2024-25739, CVE-2024-25740, CVE-2024-25744, CVE-2024-26458, CVE-2024-26461, CVE-2024-26462, CVE-2024-26589, CVE-2024-26591, CVE-2024-26595, CVE-2024-26598, CVE-2024-26601, CVE-2024-26603, CVE-2024-26605, CVE-2024-26611, CVE-2024-26612, CVE-2024-26614, CVE-2024-26615, CVE-2024-26618, CVE-2024-26621, CVE-2024-26629, CVE-2024-26630, CVE-2024-26631, CVE-2024-26637, CVE-2024-26638, CVE-2024-26640, CVE-2024-26641, CVE-2024-26645, CVE-2024-26646, CVE-2024-26647, CVE-2024-26648, CVE-2024-26649, CVE-2024-26650, CVE-2024-26656, CVE-2024-26660, CVE-2024-26661, CVE-2024-26662, CVE-2024-26663, CVE-2024-26664, CVE-2024-26666, CVE-2024-26668, CVE-2024-26669, CVE-2024-26670, CVE-2024-26672, CVE-2024-26674, CVE-2024-26675, CVE-2024-26678, CVE-2024-26679, CVE-2024-26680, CVE-2024-26681, CVE-2024-26682, CVE-2024-26683, CVE-2024-26686, CVE-2024-26687, CVE-2024-26689, CVE-2024-26691, CVE-2024-26695, CVE-2024-26698, CVE-2024-26700, CVE-2024-26704, CVE-2024-26707, CVE-2024-26708, CVE-2024-26712, CVE-2024-26714, CVE-2024-26715, CVE-2024-26717, CVE-2024-26719, CVE-2024-26721, CVE-2024-26725, CVE-2024-26733, CVE-2024-26734, CVE-2024-26739, CVE-2024-26740, CVE-2024-26742, CVE-2024-26743, CVE-2024-26744, CVE-2024-26746, CVE-2024-26751, CVE-2024-26757, CVE-2024-26758, CVE-2024-26759, CVE-2024-26760, CVE-2024-26761, CVE-2024-26763, CVE-2024-26767, CVE-2024-26769, CVE-2024-26770, CVE-2024-26771, CVE-2024-26772, CVE-2024-26774, CVE-2024-26775, CVE-2024-26776, CVE-2024-26777, CVE-2024-26778, CVE-2024-26779, CVE-2024-26782, CVE-2024-26785, CVE-2024-26786, CVE-2024-26803, CVE-2024-26810, CVE-2024-26812, CVE-2024-26815, CVE-2024-26820, CVE-2024-26826, CVE-2024-26828, CVE-2024-26830, CVE-2024-26831, CVE-2024-26835, CVE-2024-26837, CVE-2024-26838, CVE-2024-26840, CVE-2024-26843, CVE-2024-26844, CVE-2024-26845, CVE-2024-26846, CVE-2024-26851, CVE-2024-26854, CVE-2024-26857, CVE-2024-26859, CVE-2024-26861, CVE-2024-26862, CVE-2024-26863, CVE-2024-26870, CVE-2024-26872, CVE-2024-26878, CVE-2024-26882, CVE-2024-26883, CVE-2024-26889, CVE-2024-26890, CVE-2024-26891, CVE-2024-26892, CVE-2024-26894, CVE-2024-26899, CVE-2024-26900, CVE-2024-26901, CVE-2024-26902, CVE-2024-26903, CVE-2024-26906, CVE-2024-26907, CVE-2024-26915, CVE-2024-26918, CVE-2024-26920, CVE-2024-26921, CVE-2024-26922, CVE-2024-26923, CVE-2024-26924, CVE-2024-26926, CVE-2024-26927, CVE-2024-26928, CVE-2024-26933, CVE-2024-26934, CVE-2024-26937, CVE-2024-26938, CVE-2024-26939, CVE-2024-26940, CVE-2024-26945, CVE-2024-26950, CVE-2024-26951, CVE-2024-26953, CVE-2024-26958, CVE-2024-26960, CVE-2024-26961, CVE-2024-26962, CVE-2024-26964, CVE-2024-26973, CVE-2024-26975, CVE-2024-26976, CVE-2024-26979, CVE-2024-26984, CVE-2024-26987, CVE-2024-26988, CVE-2024-26989, CVE-2024-26990, CVE-2024-26991, CVE-2024-26992, CVE-2024-26999, CVE-2024-27003, CVE-2024-27004, CVE-2024-27008, CVE-2024-27010, CVE-2024-27011, CVE-2024-27012, CVE-2024-27013, CVE-2024-27014, CVE-2024-27015, CVE-2024-27017, CVE-2024-27023, CVE-2024-27025, CVE-2024-27026, CVE-2024-27027, CVE-2024-27031, CVE-2024-27038, CVE-2024-27039, CVE-2024-27042, CVE-2024-27048, CVE-2024-27055, CVE-2024-27056, CVE-2024-27057, CVE-2024-27059, CVE-2024-27062, CVE-2024-27065, CVE-2024-27073, CVE-2024-27077, CVE-2024-27079, CVE-2024-27389, CVE-2024-27390, CVE-2024-27393, CVE-2024-27395, CVE-2024-27398, CVE-2024-27399, CVE-2024-27403, CVE-2024-27404, CVE-2024-27410, CVE-2024-27413, CVE-2024-27414, CVE-2024-27431, CVE-2024-27436, CVE-2024-27437, CVE-2024-29040, CVE-2024-31076, CVE-2024-34397, CVE-2024-35195, CVE-2024-35787, CVE-2024-35790, CVE-2024-35794, CVE-2024-35795, CVE-2024-35801, CVE-2024-35802, CVE-2024-35803, CVE-2024-35804, CVE-2024-35805, CVE-2024-35807, CVE-2024-35808, CVE-2024-35809, CVE-2024-35810, CVE-2024-35812, CVE-2024-35814, CVE-2024-35817, CVE-2024-35822, CVE-2024-35824, CVE-2024-35827, CVE-2024-35831, CVE-2024-35834, CVE-2024-35835, CVE-2024-35836, CVE-2024-35838, CVE-2024-35840, CVE-2024-35843, CVE-2024-35847, CVE-2024-35853, CVE-2024-35854, CVE-2024-35855, CVE-2024-35859, CVE-2024-35860, CVE-2024-35861, CVE-2024-35862, CVE-2024-35863, CVE-2024-35864, CVE-2024-35865, CVE-2024-35866, CVE-2024-35867, CVE-2024-35868, CVE-2024-35869, CVE-2024-35872, CVE-2024-35876, CVE-2024-35877, CVE-2024-35878, CVE-2024-35879, CVE-2024-35880, CVE-2024-35886, CVE-2024-35888, CVE-2024-35891, CVE-2024-35892, CVE-2024-35894, CVE-2024-35900, CVE-2024-35901, CVE-2024-35903, CVE-2024-35904, CVE-2024-35905, CVE-2024-35908, CVE-2024-35912, CVE-2024-35913, CVE-2024-35917, CVE-2024-35918, CVE-2024-35922, CVE-2024-35923, CVE-2024-35924, CVE-2024-35925, CVE-2024-35927, CVE-2024-35928, CVE-2024-35929, CVE-2024-35930, CVE-2024-35931, CVE-2024-35933, CVE-2024-35934, CVE-2024-35938, CVE-2024-35939, CVE-2024-35942, CVE-2024-35944, CVE-2024-35945, CVE-2024-35946, CVE-2024-35947, CVE-2024-35950, CVE-2024-35952, CVE-2024-35954, CVE-2024-35957, CVE-2024-35959, CVE-2024-35963, CVE-2024-35964, CVE-2024-35965, CVE-2024-35966, CVE-2024-35967, CVE-2024-35972, CVE-2024-35973, CVE-2024-35974, CVE-2024-35976, CVE-2024-35978, CVE-2024-35979, CVE-2024-35980, CVE-2024-35981, CVE-2024-35983, CVE-2024-35989, CVE-2024-35991, CVE-2024-35995, CVE-2024-35998, CVE-2024-35999, CVE-2024-36002, CVE-2024-36006, CVE-2024-36007, CVE-2024-36008, CVE-2024-36010, CVE-2024-36011, CVE-2024-36012, CVE-2024-36013, CVE-2024-36015, CVE-2024-36021, CVE-2024-36022, CVE-2024-36028, CVE-2024-36030, CVE-2024-36031, CVE-2024-36286, CVE-2024-36477, CVE-2024-36489, CVE-2024-36880, CVE-2024-36881, CVE-2024-36882, CVE-2024-36884, CVE-2024-36885, CVE-2024-36889, CVE-2024-36891, CVE-2024-36893, CVE-2024-36896, CVE-2024-36898, CVE-2024-36899, CVE-2024-36901, CVE-2024-36902, CVE-2024-36903, CVE-2024-36905, CVE-2024-36906, CVE-2024-36909, CVE-2024-36910, CVE-2024-36911, CVE-2024-36917, CVE-2024-36918, CVE-2024-36919, CVE-2024-36920, CVE-2024-36921, CVE-2024-36922, CVE-2024-36926, CVE-2024-36927, CVE-2024-36928, CVE-2024-36930, CVE-2024-36932, CVE-2024-36933, CVE-2024-36936, CVE-2024-36937, CVE-2024-36938, CVE-2024-36939, CVE-2024-36940, CVE-2024-36944, CVE-2024-36945, CVE-2024-36949, CVE-2024-36950, CVE-2024-36954, CVE-2024-36955, CVE-2024-36956, CVE-2024-36960, CVE-2024-36961, CVE-2024-36962, CVE-2024-36966, CVE-2024-36967, CVE-2024-36968, CVE-2024-36970, CVE-2024-36974, CVE-2024-36975, CVE-2024-36977, CVE-2024-36978, CVE-2024-37891, CVE-2024-38384, CVE-2024-38388, CVE-2024-38541, CVE-2024-38555, CVE-2024-38556, CVE-2024-38559, CVE-2024-38561, CVE-2024-38564, CVE-2024-38566, CVE-2024-38573, CVE-2024-38581, CVE-2024-38588, CVE-2024-38594, CVE-2024-38596, CVE-2024-38598, CVE-2024-38600, CVE-2024-38601, CVE-2024-38604, CVE-2024-38605, CVE-2024-38606, CVE-2024-38607, CVE-2024-38612, CVE-2024-38615, CVE-2024-38618, CVE-2024-38619, CVE-2024-38627, CVE-2024-38629, CVE-2024-38632, CVE-2024-38635, CVE-2024-39276, CVE-2024-39291, CVE-2024-39298, CVE-2024-39468, CVE-2024-39471, CVE-2024-39472, CVE-2024-39473, CVE-2024-39474, CVE-2024-39479, CVE-2024-39480, CVE-2024-39483, CVE-2024-39486, CVE-2024-39487, CVE-2024-39488, CVE-2024-39490, CVE-2024-39491, CVE-2024-39493, CVE-2024-39494, CVE-2024-39497, CVE-2024-39498, CVE-2024-39499, CVE-2024-39500, CVE-2024-39501, CVE-2024-39502, CVE-2024-39503, CVE-2024-39504, CVE-2024-39507, CVE-2024-39508, CVE-2024-39509, CVE-2024-39920, CVE-2024-40866, CVE-2024-40900, CVE-2024-40901, CVE-2024-40903, CVE-2024-40904, CVE-2024-40906, CVE-2024-40907, CVE-2024-40908, CVE-2024-40913, CVE-2024-40919, CVE-2024-40922, CVE-2024-40923, CVE-2024-40924, CVE-2024-40925, CVE-2024-40929, CVE-2024-40930, CVE-2024-40931, CVE-2024-40935, CVE-2024-40936, CVE-2024-40937, CVE-2024-40939, CVE-2024-40940, CVE-2024-40941, CVE-2024-40945, CVE-2024-40948, CVE-2024-40956, CVE-2024-40959, CVE-2024-40960, CVE-2024-40964, CVE-2024-40965, CVE-2024-40966, CVE-2024-40967, CVE-2024-40972, CVE-2024-40974, CVE-2024-40977, CVE-2024-40978, CVE-2024-40980, CVE-2024-40988, CVE-2024-40989, CVE-2024-40990, CVE-2024-40992, CVE-2024-40994, CVE-2024-40995, CVE-2024-40997, CVE-2024-40998, CVE-2024-40999, CVE-2024-41000, CVE-2024-41001, CVE-2024-41003, CVE-2024-41004, CVE-2024-41005, CVE-2024-41007, CVE-2024-41008, CVE-2024-41009, CVE-2024-41010, CVE-2024-41012, CVE-2024-41013, CVE-2024-41014, CVE-2024-41020, CVE-2024-41023, CVE-2024-41031, CVE-2024-41032, CVE-2024-41035, CVE-2024-41037, CVE-2024-41038, CVE-2024-41039, CVE-2024-41042, CVE-2024-41045, CVE-2024-41047, CVE-2024-41049, CVE-2024-41056, CVE-2024-41057, CVE-2024-41058, CVE-2024-41060, CVE-2024-41062, CVE-2024-41063, CVE-2024-41064, CVE-2024-41065, CVE-2024-41066, CVE-2024-41068, CVE-2024-41069, CVE-2024-41071, CVE-2024-41072, CVE-2024-41077, CVE-2024-41079, CVE-2024-41082, CVE-2024-41084, CVE-2024-41085, CVE-2024-41087, CVE-2024-41089, CVE-2024-41090, CVE-2024-41091, CVE-2024-41092, CVE-2024-41093, CVE-2024-41094, CVE-2024-41095, CVE-2024-41097, CVE-2024-41098, CVE-2024-41957, CVE-2024-41965, CVE-2024-42063, CVE-2024-42067, CVE-2024-42068, CVE-2024-42069, CVE-2024-42070, CVE-2024-42071, CVE-2024-42073, CVE-2024-42076, CVE-2024-42078, CVE-2024-42079, CVE-2024-42080, CVE-2024-42083, CVE-2024-42084, CVE-2024-42085, CVE-2024-42090, CVE-2024-42094, CVE-2024-42097, CVE-2024-42098, CVE-2024-42101, CVE-2024-42106, CVE-2024-42107, CVE-2024-42109, CVE-2024-42114, CVE-2024-42116, CVE-2024-42123, CVE-2024-42124, CVE-2024-42125, CVE-2024-42126, CVE-2024-42129, CVE-2024-42132, CVE-2024-42133, CVE-2024-42135, CVE-2024-42136, CVE-2024-42138, CVE-2024-42139, CVE-2024-42141, CVE-2024-42145, CVE-2024-42148, CVE-2024-42151, CVE-2024-42154, CVE-2024-42159, CVE-2024-42161, CVE-2024-42162, CVE-2024-42224, CVE-2024-42225, CVE-2024-42226, CVE-2024-42228, CVE-2024-42229, CVE-2024-42230, CVE-2024-42232, CVE-2024-42237, CVE-2024-42238, CVE-2024-42239, CVE-2024-42240, CVE-2024-42241, CVE-2024-42243, CVE-2024-42244, CVE-2024-42245, CVE-2024-42253, CVE-2024-42258, CVE-2024-42259, CVE-2024-42265, CVE-2024-42268, CVE-2024-42271, CVE-2024-42272, CVE-2024-42276, CVE-2024-42278, CVE-2024-42281, CVE-2024-42283, CVE-2024-42284, CVE-2024-42285, CVE-2024-42286, CVE-2024-42287, CVE-2024-42288, CVE-2024-42289, CVE-2024-42290, CVE-2024-42291, CVE-2024-42292, CVE-2024-42294, CVE-2024-42301, CVE-2024-42302, CVE-2024-42304, CVE-2024-42305, CVE-2024-42312, CVE-2024-42315, CVE-2024-42316, CVE-2024-42317, CVE-2024-42321, CVE-2024-42322, CVE-2024-43374, CVE-2024-43790, CVE-2024-43800, CVE-2024-43802, CVE-2024-43816, CVE-2024-43817, CVE-2024-43820, CVE-2024-43821, CVE-2024-43823, CVE-2024-43826, CVE-2024-43828, CVE-2024-43829, CVE-2024-43830, CVE-2024-43834, CVE-2024-43835, CVE-2024-43840, CVE-2024-43842, CVE-2024-43846, CVE-2024-43853, CVE-2024-43854, CVE-2024-43855, CVE-2024-43856, CVE-2024-43861, CVE-2024-43863, CVE-2024-43865, CVE-2024-43866, CVE-2024-43869, CVE-2024-43870, CVE-2024-43871, CVE-2024-43873, CVE-2024-43874, CVE-2024-43879, CVE-2024-43880, CVE-2024-43882, CVE-2024-43884, CVE-2024-43888, CVE-2024-43889, CVE-2024-43890, CVE-2024-43892, CVE-2024-43893, CVE-2024-43894, CVE-2024-43896, CVE-2024-43898, CVE-2024-43906, CVE-2024-43908, CVE-2024-43910, CVE-2024-43911, CVE-2024-43912, CVE-2024-43914, CVE-2024-44185, CVE-2024-44187, CVE-2024-44244, CVE-2024-44296, CVE-2024-44309, CVE-2024-44931, CVE-2024-44932, CVE-2024-44934, CVE-2024-44935, CVE-2024-44944, CVE-2024-44947, CVE-2024-44952, CVE-2024-44954, CVE-2024-44957, CVE-2024-44958, CVE-2024-44960, CVE-2024-44961, CVE-2024-44964, CVE-2024-44965, CVE-2024-44967, CVE-2024-44970, CVE-2024-44974, CVE-2024-44975, CVE-2024-44977, CVE-2024-44983, CVE-2024-44984, CVE-2024-44985, CVE-2024-44986, CVE-2024-44987, CVE-2024-44989, CVE-2024-44990, CVE-2024-44994, CVE-2024-44996, CVE-2024-44998, CVE-2024-45000, CVE-2024-45001, CVE-2024-45003, CVE-2024-45005, CVE-2024-45006, CVE-2024-45008, CVE-2024-45009, CVE-2024-45010, CVE-2024-45012, CVE-2024-45013, CVE-2024-45016, CVE-2024-45017, CVE-2024-45018, CVE-2024-45019, CVE-2024-45020, CVE-2024-45022, CVE-2024-45025, CVE-2024-45026, CVE-2024-45027, CVE-2024-45029, CVE-2024-45306, CVE-2024-45337, CVE-2024-45338, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2024-46672, CVE-2024-46673, CVE-2024-46675, CVE-2024-46678, CVE-2024-46679, CVE-2024-46681, CVE-2024-46689, CVE-2024-46692, CVE-2024-46695, CVE-2024-46697, CVE-2024-46698, CVE-2024-46706, CVE-2024-46707, CVE-2024-46709, CVE-2024-46710, CVE-2024-46711, CVE-2024-46713, CVE-2024-46715, CVE-2024-46717, CVE-2024-46719, CVE-2024-46720, CVE-2024-46722, CVE-2024-46723, CVE-2024-46724, CVE-2024-46725, CVE-2024-46736, CVE-2024-46737, CVE-2024-46738, CVE-2024-46739, CVE-2024-46743, CVE-2024-46744, CVE-2024-46745, CVE-2024-46746, CVE-2024-46747, CVE-2024-46748, CVE-2024-46750, CVE-2024-46754, CVE-2024-46755, CVE-2024-46756, CVE-2024-46758, CVE-2024-46759, CVE-2024-46760, CVE-2024-46761, CVE-2024-46762, CVE-2024-46765, CVE-2024-46766, CVE-2024-46767, CVE-2024-46770, CVE-2024-46771, CVE-2024-46774, CVE-2024-46777, CVE-2024-46783, CVE-2024-46784, CVE-2024-46786, CVE-2024-46787, CVE-2024-46788, CVE-2024-46791, CVE-2024-46793, CVE-2024-46794, CVE-2024-46796, CVE-2024-46797, CVE-2024-46798, CVE-2024-46800, CVE-2024-46805, CVE-2024-46806, CVE-2024-46807, CVE-2024-46819, CVE-2024-46820, CVE-2024-46822, CVE-2024-46823, CVE-2024-46824, CVE-2024-46825, CVE-2024-46826, CVE-2024-46828, CVE-2024-46830, CVE-2024-46834, CVE-2024-46835, CVE-2024-46839, CVE-2024-46842, CVE-2024-46845, CVE-2024-46853, CVE-2024-46855, CVE-2024-46857, CVE-2024-46858, CVE-2024-46859, CVE-2024-46860, CVE-2024-46861, CVE-2024-46862, CVE-2024-46863, CVE-2024-46864, CVE-2024-46871, CVE-2024-47175, CVE-2024-47535, CVE-2024-47538, CVE-2024-47541, CVE-2024-47542, CVE-2024-47554, CVE-2024-47600, CVE-2024-47607, CVE-2024-47615, CVE-2024-47660, CVE-2024-47668, CVE-2024-47671, CVE-2024-47672, CVE-2024-47673, CVE-2024-47674, CVE-2024-47675, CVE-2024-47678, CVE-2024-47679, CVE-2024-47682, CVE-2024-47684, CVE-2024-47685, CVE-2024-47687, CVE-2024-47692, CVE-2024-47693, CVE-2024-47696, CVE-2024-47700, CVE-2024-47701, CVE-2024-47702, CVE-2024-47703, CVE-2024-47705, CVE-2024-47706, CVE-2024-47707, CVE-2024-47710, CVE-2024-47713, CVE-2024-47715, CVE-2024-47718, CVE-2024-47719, CVE-2024-47727, CVE-2024-47728, CVE-2024-47734, CVE-2024-47737, CVE-2024-47738, CVE-2024-47739, CVE-2024-47745, CVE-2024-47748, CVE-2024-47749, CVE-2024-47814, CVE-2024-47835, CVE-2024-49851, CVE-2024-49855, CVE-2024-49856, CVE-2024-49860, CVE-2024-49861, CVE-2024-49862, CVE-2024-49864, CVE-2024-49866, CVE-2024-49870, CVE-2024-49875, CVE-2024-49878, CVE-2024-49880, CVE-2024-49881, CVE-2024-49882, CVE-2024-49883, CVE-2024-49884, CVE-2024-49885, CVE-2024-49886, CVE-2024-49888, CVE-2024-49889, CVE-2024-49891, CVE-2024-49904, CVE-2024-49925, CVE-2024-49927, CVE-2024-49928, CVE-2024-49929, CVE-2024-49930, CVE-2024-49933, CVE-2024-49934, CVE-2024-49935, CVE-2024-49937, CVE-2024-49938, CVE-2024-49939, CVE-2024-49940, CVE-2024-49944, CVE-2024-49946, CVE-2024-49948, CVE-2024-49949, CVE-2024-49950, CVE-2024-49951, CVE-2024-49952, CVE-2024-49953, CVE-2024-49954, CVE-2024-49955, CVE-2024-49959, CVE-2024-49960, CVE-2024-49962, CVE-2024-49967, CVE-2024-49968, CVE-2024-49971, CVE-2024-49973, CVE-2024-49974, CVE-2024-49975, CVE-2024-49976, CVE-2024-49977, CVE-2024-49978, CVE-2024-49983, CVE-2024-49991, CVE-2024-49993, CVE-2024-49994, CVE-2024-49995, CVE-2024-49999, CVE-2024-50000, CVE-2024-50001, CVE-2024-50002, CVE-2024-50006, CVE-2024-50007, CVE-2024-50008, CVE-2024-50009, CVE-2024-50010, CVE-2024-50012, CVE-2024-50013, CVE-2024-50014, CVE-2024-50015, CVE-2024-50018, CVE-2024-50019, CVE-2024-50020, CVE-2024-50021, CVE-2024-50022, CVE-2024-50023, CVE-2024-50024, CVE-2024-50027, CVE-2024-50028, CVE-2024-50029, CVE-2024-50033, CVE-2024-50035, CVE-2024-50036, CVE-2024-50038, CVE-2024-50039, CVE-2024-50040, CVE-2024-50041, CVE-2024-50042, CVE-2024-50044, CVE-2024-50045, CVE-2024-50046, CVE-2024-50047, CVE-2024-50048, CVE-2024-50055, CVE-2024-50057, CVE-2024-50058, CVE-2024-50060, CVE-2024-50063, CVE-2024-50064, CVE-2024-50067, CVE-2024-50073, CVE-2024-50074, CVE-2024-50075, CVE-2024-50076, CVE-2024-50077, CVE-2024-50078, CVE-2024-50081, CVE-2024-50082, CVE-2024-50083, CVE-2024-50093, CVE-2024-50095, CVE-2024-50099, CVE-2024-50101, CVE-2024-50102, CVE-2024-50106, CVE-2024-50107, CVE-2024-50109, CVE-2024-50110, CVE-2024-50114, CVE-2024-50115, CVE-2024-50117, CVE-2024-50120, CVE-2024-50121, CVE-2024-50124, CVE-2024-50125, CVE-2024-50126, CVE-2024-50127, CVE-2024-50128, CVE-2024-50131, CVE-2024-50135, CVE-2024-50136, CVE-2024-50138, CVE-2024-50139, CVE-2024-50141, CVE-2024-50142, CVE-2024-50143, CVE-2024-50145, CVE-2024-50146, CVE-2024-50147, CVE-2024-50148, CVE-2024-50150, CVE-2024-50151, CVE-2024-50152, CVE-2024-50153, CVE-2024-50154, CVE-2024-50155, CVE-2024-50157, CVE-2024-50158, CVE-2024-50160, CVE-2024-50162, CVE-2024-50163, CVE-2024-50164, CVE-2024-50165, CVE-2024-50167, CVE-2024-50169, CVE-2024-50172, CVE-2024-50179, CVE-2024-50182, CVE-2024-50183, CVE-2024-50185, CVE-2024-50186, CVE-2024-50189, CVE-2024-50191, CVE-2024-50192, CVE-2024-50194, CVE-2024-50195, CVE-2024-50197, CVE-2024-50199, CVE-2024-50200, CVE-2024-50201, CVE-2024-50207, CVE-2024-50208, CVE-2024-50209, CVE-2024-50211, CVE-2024-50215, CVE-2024-50216, CVE-2024-50219, CVE-2024-50223, CVE-2024-50226, CVE-2024-50228, CVE-2024-50235, CVE-2024-50236, CVE-2024-50237, CVE-2024-50250, CVE-2024-50251, CVE-2024-50252, CVE-2024-50255, CVE-2024-50256, CVE-2024-50258, CVE-2024-50259, CVE-2024-50261, CVE-2024-50262, CVE-2024-50264, CVE-2024-50267, CVE-2024-50268, CVE-2024-50271, CVE-2024-50272, CVE-2024-50274, CVE-2024-50275, CVE-2024-50277, CVE-2024-50278, CVE-2024-50279, CVE-2024-50280, CVE-2024-50282, CVE-2024-50294, CVE-2024-50299, CVE-2024-50301, CVE-2024-50302, CVE-2024-50303, CVE-2024-50304, CVE-2024-50602, CVE-2024-50612, CVE-2024-50613, CVE-2024-52303, CVE-2024-52304, CVE-2024-52530, CVE-2024-52531, CVE-2024-52532, CVE-2024-52615, CVE-2024-52616, CVE-2024-52798, CVE-2024-53042, CVE-2024-53044, CVE-2024-53045, CVE-2024-53047, CVE-2024-53048, CVE-2024-53050, CVE-2024-53051, CVE-2024-53052, CVE-2024-53054, CVE-2024-53055, CVE-2024-53057, CVE-2024-53059, CVE-2024-53060, CVE-2024-53064, CVE-2024-53066, CVE-2024-53070, CVE-2024-53072, CVE-2024-53073, CVE-2024-53074, CVE-2024-53079, CVE-2024-53082, CVE-2024-53085, CVE-2024-53088, CVE-2024-53090, CVE-2024-53091, CVE-2024-53093, CVE-2024-53094, CVE-2024-53095, CVE-2024-53096, CVE-2024-53097, CVE-2024-53099, CVE-2024-53100, CVE-2024-53102, CVE-2024-53103, CVE-2024-53104, CVE-2024-53105, CVE-2024-53109, CVE-2024-53110, CVE-2024-53113, CVE-2024-53114, CVE-2024-53117, CVE-2024-53118, CVE-2024-53119, CVE-2024-53120, CVE-2024-53121, CVE-2024-53122, CVE-2024-53123, CVE-2024-53124, CVE-2024-53125, CVE-2024-53134, CVE-2024-53135, CVE-2024-53136, CVE-2024-53138, CVE-2024-53140, CVE-2024-53141, CVE-2024-53142, CVE-2024-53240, CVE-2024-53241, CVE-2024-53920, CVE-2024-53981, CVE-2024-54479, CVE-2024-54502, CVE-2024-54505, CVE-2024-54508, CVE-2024-54534, CVE-2024-55565, CVE-2024-56201, CVE-2024-56326, CVE-2024-56378, CVE-2024-56431, CVE-2024-56826, CVE-2024-56827
CVE-2023-0045, CVE-2023-0049, CVE-2023-0051, CVE-2023-0054, CVE-2023-0215, CVE-2023-0286, CVE-2023-0288, CVE-2023-0433, CVE-2023-0464, CVE-2023-0465, CVE-2023-0466, CVE-2023-0512, CVE-2023-1077, CVE-2023-1118, CVE-2023-1127, CVE-2023-1170, CVE-2023-1175, CVE-2023-1264, CVE-2023-1380, CVE-2023-1513, CVE-2023-1579, CVE-2023-1838, CVE-2023-1916, CVE-2023-1972, CVE-2023-2019, CVE-2023-2156, CVE-2023-2162, CVE-2023-2609, CVE-2023-2610, CVE-2023-2650, CVE-2023-3006, CVE-2023-3164, CVE-2023-3446, CVE-2023-3640, CVE-2023-3817, CVE-2023-4387, CVE-2023-4459, CVE-2023-4504, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4750, CVE-2023-4751, CVE-2023-4752, CVE-2023-4781, CVE-2023-5090, CVE-2023-5197, CVE-2023-5344, CVE-2023-5441, CVE-2023-5535, CVE-2023-5678,CVE-2023-6277, CVE-2023-7042,CVE-2023-7192, CVE-2023-24056, CVE-2023-25433, CVE-2023-25434, CVE-2023-25435, CVE-2023-28327, CVE-2023-28746, CVE-2023-31082, CVE-2023-31085, CVE-2023-32681, CVE-2023-37454, CVE-2023-39327, CVE-2023-39328, CVE-2023-39329, CVE-2023-39742, CVE-2023-39804, CVE-2023-43804, CVE-2023-45288, CVE-2023-45803, CVE-2023-45862, CVE-2023-46246, CVE-2023-47233, CVE-2023-48161, CVE-2023-48231, CVE-2023-48232, CVE-2023-48233, CVE-2023-48234, CVE-2023-48235, CVE-2023-48236, CVE-2023-48237, CVE-2023-48706, CVE-2023-51767, CVE-2023-52355, CVE-2023-52356, CVE-2023-52445, CVE-2023-52447, CVE-2023-52450, CVE-2023-52451, CVE-2023-52452, CVE-2023-52455, CVE-2023-52462, CVE-2023-52464, CVE-2023-52465, CVE-2023-52466, CVE-2023-52467, CVE-2023-52468, CVE-2023-52469, CVE-2023-52470, CVE-2023-52472, CVE-2023-52473, CVE-2023-52474, CVE-2023-52475, CVE-2023-52477, CVE-2023-52478, CVE-2023-52481, CVE-2023-52482, CVE-2023-52484, CVE-2023-52486, CVE-2023-52487, CVE-2023-52492, CVE-2023-52498, CVE-2023-52501, CVE-2023-52508, CVE-2023-52513, CVE-2023-52516, CVE-2023-52518, CVE-2023-52519, CVE-2023-52520, CVE-2023-52523, CVE-2023-52528, CVE-2023-52532, CVE-2023-52560, CVE-2023-52565, CVE-2023-52568, CVE-2023-52570, CVE-2023-52575, CVE-2023-52582, CVE-2023-52583, CVE-2023-52585, CVE-2023-52594, CVE-2023-52595, CVE-2023-52598, CVE-2023-52605, CVE-2023-52606, CVE-2023-52614, CVE-2023-52615, CVE-2023-52619, CVE-2023-52621, CVE-2023-52622, CVE-2023-52623, CVE-2023-52624, CVE-2023-52625, CVE-2023-52628, CVE-2023-52630, CVE-2023-52632, CVE-2023-52634, CVE-2023-52635, CVE-2023-52637, CVE-2023-52643, CVE-2023-52646, CVE-2023-52648, CVE-2023-52649, CVE-2023-52650, CVE-2023-52653, CVE-2023-52654, CVE-2023-52656, CVE-2023-52658, CVE-2023-52659, CVE-2023-52661, CVE-2023-52662, CVE-2023-52663, CVE-2023-52664, CVE-2023-52669, CVE-2023-52672, CVE-2023-52674, CVE-2023-52675, CVE-2023-52676, CVE-2023-52679, CVE-2023-52680, CVE-2023-52683, CVE-2023-52686, CVE-2023-52689, CVE-2023-52690, CVE-2023-52696, CVE-2023-52697, CVE-2023-52698, CVE-2023-52700, CVE-2023-52702, CVE-2023-52703, CVE-2023-52704, CVE-2023-52706, CVE-2023-52730, CVE-2023-52731, CVE-2023-52732, CVE-2023-52734, CVE-2023-52735, CVE-2023-52736, CVE-2023-52738, CVE-2023-52739, CVE-2023-52740, CVE-2023-52743, CVE-2023-52744, CVE-2023-52747, CVE-2023-52749, CVE-2023-52750, CVE-2023-52751, CVE-2023-52752, CVE-2023-52756, CVE-2023-52757, CVE-2023-52758, CVE-2023-52759, CVE-2023-52760, CVE-2023-52762, CVE-2023-52771, CVE-2023-52775, CVE-2023-52778, CVE-2023-52782, CVE-2023-52784, CVE-2023-52786, CVE-2023-52787, CVE-2023-52788, CVE-2023-52791, CVE-2023-52792, CVE-2023-52794, CVE-2023-52795, CVE-2023-52796, CVE-2023-52798, CVE-2023-52800, CVE-2023-52801, CVE-2023-52803, CVE-2023-52806, CVE-2023-52808, CVE-2023-52811, CVE-2023-52813, CVE-2023-52814, CVE-2023-52815, CVE-2023-52817, CVE-2023-52818, CVE-2023-52819, CVE-2023-52828, CVE-2023-52831, CVE-2023-52832, CVE-2023-52833, CVE-2023-52834, CVE-2023-52835, CVE-2023-52837, CVE-2023-52840, CVE-2023-52842, CVE-2023-52845, CVE-2023-52846, CVE-2023-52849, CVE-2023-52851, CVE-2023-52854, CVE-2023-52859, CVE-2023-52864, CVE-2023-52866, CVE-2023-52867, CVE-2023-52869, CVE-2023-52872, CVE-2023-52878, CVE-2023-52880, CVE-2023-52881, CVE-2023-52882, CVE-2023-52883, CVE-2023-52884, CVE-2023-52885, CVE-2023-52886, CVE-2023-52898, CVE-2023-52901, CVE-2023-52902, CVE-2023-52905, CVE-2023-52906, CVE-2023-52908, CVE-2023-52909, CVE-2023-52910, CVE-2023-52912, CVE-2023-52917, CVE-2023-52920, CVE-2023-52921, CVE-2023-52922
CVE-2022-0171, CVE-2022-0213, CVE-2022-0351, CVE-2022-0500, CVE-2022-1056, CVE-2022-1247, CVE-2022-1292, CVE-2022-1616, CVE-2022-1619, CVE-2022-1620, CVE-2022-1674, CVE-2022-1720, CVE-2022-1725, CVE-2022-1972, CVE-2022-1974, CVE-2022-2042, CVE-2022-2068, CVE-2022-2097, CVE-2022-2124, CVE-2022-2125, CVE-2022-2126, CVE-2022-2129, CVE-2022-2175, CVE-2022-2182, CVE-2022-2183, CVE-2022-2206, CVE-2022-2207, CVE-2022-2208, CVE-2022-2210, CVE-2022-2257, CVE-2022-2284, CVE-2022-2285, CVE-2022-2286, CVE-2022-2287, CVE-2022-2304, CVE-2022-2343, CVE-2022-2344, CVE-2022-2345, CVE-2022-2522, CVE-2022-2785, CVE-2022-2817, CVE-2022-2819, CVE-2022-2845, CVE-2022-2849, CVE-2022-2862, CVE-2022-2874, CVE-2022-2889, CVE-2022-2905, CVE-2022-2923, CVE-2022-2946, CVE-2022-2980, CVE-2022-2982, CVE-2022-3016, CVE-2022-3037, CVE-2022-3099, CVE-2022-3134, CVE-2022-3153, CVE-2022-3234, CVE-2022-3235, CVE-2022-3256, CVE-2022-3278, CVE-2022-3296, CVE-2022-3297, CVE-2022-3324, CVE-2022-3344, CVE-2022-3352, CVE-2022-3424, CVE-2022-3534, CVE-2022-3542, CVE-2022-3554, CVE-2022-3555, CVE-2022-3606, CVE-2022-3629, CVE-2022-3633, CVE-2022-3705,CVE-2022-3857, CVE-2022-3903, CVE-2022-4141, CVE-2022-4292, CVE-2022-4293, CVE-2022-4304, CVE-2022-4450, CVE-2022-4543, CVE-2022-20153, CVE-2022-20154, CVE-2022-22822, CVE-2022-22823, CVE-2022-22824, CVE-2022-22825, CVE-2022-22826, CVE-2022-22827, CVE-2022-23222, CVE-2022-24959, CVE-2022-25265, CVE-2022-26878, CVE-2022-26966, CVE-2022-27672, CVE-2022-36313, CVE-2022-37050, CVE-2022-37051, CVE-2022-37052, CVE-2022-38533, CVE-2022-40896, CVE-2022-41741, CVE-2022-41742, CVE-2022-44840, CVE-2022-47007, CVE-2022-47008, CVE-2022-47010, CVE-2022-47011, CVE-2022-48628, CVE-2022-48632, CVE-2022-48635, CVE-2022-48637, CVE-2022-48638, CVE-2022-48639, CVE-2022-48640, CVE-2022-48641, CVE-2022-48643, CVE-2022-48644, CVE-2022-48652, CVE-2022-48653, CVE-2022-48657, CVE-2022-48658, CVE-2022-48660, CVE-2022-48662, CVE-2022-48669, CVE-2022-48672, CVE-2022-48673, CVE-2022-48675, CVE-2022-48689, CVE-2022-48690, CVE-2022-48691, CVE-2022-48694, CVE-2022-48696, CVE-2022-48697, CVE-2022-48701, CVE-2022-48702, CVE-2022-48703, CVE-2022-48704, CVE-2022-48705, CVE-2022-48706, CVE-2022-48707, CVE-2022-48709, CVE-2022-48710, CVE-2022-48712, CVE-2022-48713, CVE-2022-48714, CVE-2022-48719, CVE-2022-48720, CVE-2022-48721, CVE-2022-48724, CVE-2022-48725, CVE-2022-48727, CVE-2022-48728, CVE-2022-48729, CVE-2022-48731, CVE-2022-48732, CVE-2022-48736, CVE-2022-48737, CVE-2022-48741, CVE-2022-48744, CVE-2022-48745, CVE-2022-48746, CVE-2022-48748, CVE-2022-48751, CVE-2022-48752, CVE-2022-48754, CVE-2022-48757, CVE-2022-48760, CVE-2022-48761, CVE-2022-48763, CVE-2022-48764, CVE-2022-48767, CVE-2022-48768, CVE-2022-48769, CVE-2022-48770, CVE-2022-48773, CVE-2022-48778, CVE-2022-48780, CVE-2022-48781, CVE-2022-48783, CVE-2022-48784, CVE-2022-48785, CVE-2022-48786, CVE-2022-48787, CVE-2022-48793, CVE-2022-48796, CVE-2022-48797, CVE-2022-48799, CVE-2022-48800, CVE-2022-48801, CVE-2022-48802, CVE-2022-48804, CVE-2022-48806, CVE-2022-48809, CVE-2022-48810, CVE-2022-48811, CVE-2022-48812, CVE-2022-48813, CVE-2022-48814, CVE-2022-48815, CVE-2022-48816, CVE-2022-48817, CVE-2022-48818, CVE-2022-48819, CVE-2022-48823, CVE-2022-48825, CVE-2022-48830, CVE-2022-48831, CVE-2022-48832, CVE-2022-48834, CVE-2022-48835, CVE-2022-48836, CVE-2022-48837, CVE-2022-48839, CVE-2022-48840, CVE-2022-48843, CVE-2022-48844, CVE-2022-48848, CVE-2022-48849, CVE-2022-48850, CVE-2022-48853, CVE-2022-48858, CVE-2022-48861, CVE-2022-48862, CVE-2022-48863, CVE-2022-48864, CVE-2022-48865, CVE-2022-48866, CVE-2022-48875, CVE-2022-48876, CVE-2022-48879, CVE-2022-48883, CVE-2022-48884, CVE-2022-48885, CVE-2022-48886, CVE-2022-48887, CVE-2022-48889, CVE-2022-48890, CVE-2022-48896, CVE-2022-48899, CVE-2022-48900, CVE-2022-48913, CVE-2022-48914, CVE-2022-48915, CVE-2022-48921, CVE-2022-48929, CVE-2022-48931, CVE-2022-48934, CVE-2022-48938, CVE-2022-48939, CVE-2022-48943, CVE-2022-48944, CVE-2022-48946, CVE-2022-48950, CVE-2022-48951, CVE-2022-48953, CVE-2022-48961, CVE-2022-48963, CVE-2022-48968, CVE-2022-48969, CVE-2022-48971, CVE-2022-48972, CVE-2022-48974, CVE-2022-48975, CVE-2022-48978, CVE-2022-48979, CVE-2022-48981, CVE-2022-48982, CVE-2022-48983, CVE-2022-48984, CVE-2022-48985, CVE-2022-48986, CVE-2022-48987, CVE-2022-48988, CVE-2022-48989, CVE-2022-48990, CVE-2022-48991, CVE-2022-48994, CVE-2022-48997, CVE-2022-48999, CVE-2022-49005, CVE-2022-49006, CVE-2022-49011, CVE-2022-49012, CVE-2022-49013, CVE-2022-49014, CVE-2022-49015, CVE-2022-49017, CVE-2022-49021, CVE-2022-49022, CVE-2022-49024, CVE-2022-49027, CVE-2022-49028,CVE-2022-49029
CVE-2021-3572, CVE-2021-3714,CVE-2021-3782, CVE-2021-3826, CVE-2021-3903, CVE-2021-3927, CVE-2021-3928, CVE-2021-3968, CVE-2021-3973, CVE-2021-3974, CVE-2021-4135, CVE-2021-4136, CVE-2021-4166, CVE-2021-4173, CVE-2021-4187, CVE-2021-4202, CVE-2021-4204, CVE-2021-20197, CVE-2021-20320, CVE-2021-23336, CVE-2021-25317, CVE-2021-27290, CVE-2021-28711, CVE-2021-28712, CVE-2021-28713, CVE-2021-31535, CVE-2021-32815, CVE-2021-33656, CVE-2021-34334, CVE-2021-34335, CVE-2021-34693, CVE-2021-34866, CVE-2021-36217, CVE-2021-37159, CVE-2021-37615, CVE-2021-37616, CVE-2021-37620, CVE-2021-37621, CVE-2021-37622, CVE-2021-37623, CVE-2021-42739, CVE-2021-43975, CVE-2021-45078, CVE-2021-45402, CVE-2021-45940, CVE-2021-45941, CVE-2021-46904, CVE-2021-46909, CVE-2021-46910, CVE-2021-46917, CVE-2021-46918, CVE-2021-46919, CVE-2021-46920, CVE-2021-46923, CVE-2021-46931, CVE-2021-46932, CVE-2021-46937, CVE-2021-46999, CVE-2021-47014, CVE-2021-47017, CVE-2021-47020, CVE-2021-47033, CVE-2021-47041, CVE-2021-47070, CVE-2021-47071, CVE-2021-47073, CVE-2021-47074, CVE-2021-47075, CVE-2021-47079, CVE-2021-47089, CVE-2021-47092, CVE-2021-47097, CVE-2021-47098, CVE-2021-47101, CVE-2021-47103, CVE-2021-47182, CVE-2021-47185, CVE-2021-47191, CVE-2021-47196, CVE-2021-47197, CVE-2021-47199, CVE-2021-47202, CVE-2021-47210, CVE-2021-47214, CVE-2021-47215, CVE-2021-47217, CVE-2021-47222, CVE-2021-47223, CVE-2021-47226, CVE-2021-47227, CVE-2021-47230, CVE-2021-47236, CVE-2021-47237, CVE-2021-47238, CVE-2021-47239, CVE-2021-47241, CVE-2021-47250, CVE-2021-47251, CVE-2021-47257, CVE-2021-47261, CVE-2021-47266, CVE-2021-47272, CVE-2021-47275, CVE-2021-47287, CVE-2021-47290, CVE-2021-47308, CVE-2021-47313, CVE-2021-47316, CVE-2021-47317, CVE-2021-47318, CVE-2021-47325, CVE-2021-47327, CVE-2021-47343, CVE-2021-47346, CVE-2021-47349, CVE-2021-47352, CVE-2021-47360, CVE-2021-47365, CVE-2021-47373, CVE-2021-47378, CVE-2021-47380, CVE-2021-47383, CVE-2021-47384, CVE-2021-47385, CVE-2021-47386, CVE-2021-47393, CVE-2021-47398, CVE-2021-47404, CVE-2021-47420, CVE-2021-47422, CVE-2021-47426, CVE-2021-47428, CVE-2021-47429, CVE-2021-47430, CVE-2021-47432, CVE-2021-47438, CVE-2021-47441, CVE-2021-47444, CVE-2021-47449, CVE-2021-47454, CVE-2021-47455, CVE-2021-47457, CVE-2021-47465, CVE-2021-47481, CVE-2021-47483, CVE-2021-47488, CVE-2021-47490, CVE-2021-47495, CVE-2021-47497, CVE-2021-47499, CVE-2021-47500, CVE-2021-47504, CVE-2021-47505, CVE-2021-47516, CVE-2021-47517, CVE-2021-47519, CVE-2021-47527, CVE-2021-47536, CVE-2021-47537, CVE-2021-47538, CVE-2021-47539, CVE-2021-47550, CVE-2021-47558, CVE-2021-47559, CVE-2021-47561, CVE-2021-47572, CVE-2021-47576, CVE-2021-47578, CVE-2021-47579, CVE-2021-47582, CVE-2021-47601, CVE-2021-47607, CVE-2021-47609, CVE-2021-47613, CVE-2021-47615, CVE-2021-47616, CVE-2021-47617, CVE-2021-47620, CVE-2021-47622,CVE-2021-47623
CVE-2020-10135, CVE-2020-12413, CVE-2020-13844, CVE-2020-14304, CVE-2020-18771, CVE-2020-23922, CVE-2020-26140, CVE-2020-26144, CVE-2020-26146, CVE-2020-35501, CVE-2020-36023, CVE-2020-36386, CVE-2020-36558, CVE-2020-36781, CVE-2020-36782
CVE-2019-16089, CVE-2019-16163, CVE-2019-25162
CVE-2018-13419
CVE-2017-6519, CVE-2017-16232, CVE-2017-17973, CVE-2017-1000383
CVE-2016-1247, CVE-2016-20012
CVE-2005-0602, CVE-2005-2541
CVE-2001-1268, CVE-2001-1269
- Deprecated features
- The following features were deprecated in this release:
- Deprecated foundation models
- The following models are now deprecated and will be withdrawn in a future release:
granite-13b-chat-v2
granite-20b-multilingual
codellama-34b-instruct-hf
llama-3-1-8b-instruct
llama-3-1-70b-instruct
For details, see Foundation model lifecycle.
IBM Software Hub Version 5.1.0
A new version of watsonx.ai was released in December 2024 with IBM Software Hub 5.1.0.
Operand version: 10.0.0
This release includes the following changes:
- New features
-
This release of watsonx.ai includes the following features:
- Install watsonx.ai on a single node OpenShift® (SNO) cluster
- You can now install watsonx.ai in the full service or lightweight engine mode on a single node OpenShift (SNO) cluster if high availability and scalability is not a requirement. For details, see IBM Software Hub platform hardware requirements and Choosing an installation mode in IBM watsonx.ai.
- New software specification for deploying custom foundation models
- You can now deploy custom foundation models by using the new
watsonx-cfm-caikit-1.1
software specification. This software specification is not available with every model architecture. - New model architectures for deploying custom foundation models
- You can now deploy custom foundation models from the following model architectures with the
vLLM
runtime:Bloom
Databricks
exaone
Falcon
GPTJ
Gemma
Gemma2
GPT_BigCode
GPT_Neox
GPTJ
GPT2
Granite
Jais
Llama
Marlin
Mistral
Mixtral
MPT
Nemotron
Olmo
Persimmon
Phi
Phi3
Qwen2
- Deploy custom foundation models on MIG-enabled clusters
-
You can now deploy custom foundation models on a cluster with Multi-Instance GPU (MIG) enablement. MIG is useful when you want to deploy an application that does not require the full power of an entire GPU.
Review hardware requirements and configure MIG support to deploy your custom foundation models. For more information, see Requirements for deploying custom foundation models on MIG-enabled clusters.
- Deploy custom foundation models on specific GPU nodes
- You can now deploy custom foundation models on specific GPU nodes when you have multiple GPU nodes available for deployment. Review the process of creating a customized hardware specification to use a specific GPU node for deploying your custom foundation model.
- Automate the building of RAG patterns with AutoAI
- Use AutoAI to automate the
retrieval-augmented generation (RAG) process for a generative AI solution. Upload a collection of
documents and transform them into vectors that can be used to improve the output from a large
language model. Compare optimized pipelines to select the best RAG pattern for your
application.
- Simplify complex documents by using the text extraction API
- Simplify your complex documents so that they can be processed by foundation models as part of a generative AI workflow. The text extraction API uses document understanding processing to extract text from document structures such as images, diagrams, and tables that foundation models often cannot interpret correctly.
- Chat with multimodal foundation models about images
- Add an image to your prompt and chat about the content of the image with a multimodal foundation model that supports image-to-text tasks. You can chat about images from the Prompt Lab in chat mode or by using the Chat API.
- Build conversational workflows with the watsonx.ai chat API
- Use the watsonx.ai chat API to add generative AI capabilities, including agent-driven calls to third-party tools and services, into your applications.
- Add contextual information to foundation model prompts in Prompt Lab
- Help a foundation model generate factual and up-to-date answers in RAG use cases by adding relevant contextual information to your prompt as grounding data. You can upload relevant documents or connect to a third-party vector store that has relevant data. When a new question is submitted, the question is used to query the grounding data for relevant facts. The top search results plus the original question are submitted as model input to help the foundation model incorporate relevant facts in its output.
- Work with new foundation models in Prompt Lab
- You can now use the following foundation models for inferencing from the API and from the
Prompt Lab in watsonx.ai:
- Granite Guardian 3.0 models in 2 billion and 8 billion parameter sizes
- Granite Instruct 3.0 models in 2 billion and 8 billion parameter sizes
granite-20b-code-base-sql-gen
granite-20b-code-base-schema-linking
codestral-22b
- Llama 3.2 Instruct models in 1 billion and 3 billion parameter sizes
- Llama 3.2 Vision Instruct models in 11 billion and 90 billion parameter sizes
llama-guard-3-11b-vision
mistral-small
ministral-8b
pixtral-12b
For details, see Foundation models in watsonx.ai.
- Work with new embedding models for text matching and retrieval tasks
- You can now use the following embedding models to vectorize text in watsonx.ai:
all-minilm-l12-v2
For details, see Foundation models in watsonx.ai.
- Enhance search and retrieval tasks with the text rerank API
- Use the text rerank method in the watsonx.ai REST API together with the
ms-marco-minilm-l-12-v2
reranker model to reorder a set of document passages based on their similarity to a specified query. Reranking adds precision to your answer retrieval workflows.For details about the
ms-marco-minilm-l-12-v2
model, see Foundation models in watsonx.ai. - Review benchmarks that show how foundation models perform on common tasks
-
Review foundation model benchmarks to learn about the capabilities of foundation models deployed in watsonx.ai before you try them out. Compare how various foundation models perform on the tasks that matter most for your use case.
- Configure AI guardrails for user input and foundation model output separately in Prompt Lab
- Adjust the sensitivity of the AI guardrails that find and remove harmful content when you experiment with foundation model prompts in Prompt Lab. You can set different filter sensitivity levels for user input and model output text, and you can save effective AI guardrails settings in prompt templates.
To read more about these features, see What's new and changed in watsonx.ai in the IBM watsonx documentation.
- Updates
- The following updates were introduced in this release:
- New version of the
granite-3b-code-instruct
foundation model - The
granite-3b-code-instruct
foundation model is updated to version 2.0.0. The latest modification can handle larger prompts. The context window length (input + output) for prompts increased from 8,192 to 128,000.
- New version of the
- Issues fixed in this release
- The following issues were fixed in this release:
- Prompt template or prompt session loses the associated custom foundation model after an upgrade
-
- Issue: After you upgrade the software, when you open a prompt template or prompt session
asset for a custom foundation model that was saved in an earlier software version, the foundation
model field is empty. The Model field shows
No model selected
. - Resolution: A prompt template asset saved in an earlier software version retains the associated custom foundation model after an upgrade.
- Issue: After you upgrade the software, when you open a prompt template or prompt session
asset for a custom foundation model that was saved in an earlier software version, the foundation
model field is empty. The Model field shows
- Cannot preview chat and freeform prompt templates that are saved to a catalog
-
- Issue: When you save a prompt template that was created in the Prompt Lab in structured mode, and then add the prompt template to a catalog, you can preview the prompt template asset from the Assets page of the catalog. However, when you try to preview a prompt template asset that was created in chat or freeform mode, a blank page is displayed.
- Resolution: You can preview prompt templates that are created in chat and freeform modes and saved to a catalog.
- Customer-reported issues fixed in this release
- For a list of customer-reported issues that were fixed in this release, see the Fix List for IBM Cloud Pak for Data on the IBM Support website.
- Security issues fixed in this release
- The following security issues were fixed in this release:
CVE-2024-2398, CVE-2024-4067, CVE-2024-4558, CVE-2024-6119, CVE-2024-6501, CVE-2024-6923, CVE-2024-7006, CVE-2024-7042, CVE-2024-7774, CVE-2024-8768, CVE-2024-8775, CVE-2024-9341, CVE-2024-9902, CVE-2024-21208, CVE-2024-21210, CVE-2024-21217, CVE-2024-21235, CVE-2024-23222, CVE-2024-23271, CVE-2024-27808, CVE-2024-27820, CVE-2024-27833, CVE-2024-27838, CVE-2024-27851, CVE-2024-30203, CVE-2024-30204, CVE-2024-30205, CVE-2024-34397, CVE-2024-37370, CVE-2024-37371, CVE-2024-37891, CVE-2024-39331, CVE-2024-40776, CVE-2024-40779, CVE-2024-40780, CVE-2024-40782, CVE-2024-40789, CVE-2024-40866, CVE-2024-42367, CVE-2024-43796, CVE-2024-43799, CVE-2024-44187, CVE-2024-45296, CVE-2024-45490, CVE-2024-45492, CVE-2024-45590, CVE-2024-47175, CVE-2024-47554, CVE-2024-47764, CVE-2024-47874, CVE-2024-48948, CVE-2024-49766, CVE-2024-49767
CVE-2023-5752, CVE-2023-37920, CVE-2023-38552, CVE-2023-40397, CVE-2023-42843, CVE-2023-42852, CVE-2023-42917, CVE-2023-42950, CVE-2023-42956, CVE-2023-45143
CVE-2022-32885
- Deprecated features
- The following features were deprecated in this release:
- Deprecated foundation models
- The following models are now deprecated and will be withdrawn in a future release:
granite-7b-lab
llama2-13b-dpo-v7
llama-3-8b-instruct
llama-3-70b-instruct
mt0-xxl-13b
- Withdrawn foundation models
- The following models are now withdrawn from the watsonx.ai service:
llama-2-70b-chat
merlinite-7b
For details, see Foundation model lifecycle.