What's new and changed in watsonx.ai

watsonx.ai updates can include new features and fixes. Releases are listed in reverse chronological order so that the latest release is at the beginning of the topic.

You can see a list of the new features for the platform and all of the services at What's new in IBM Software Hub.

Installing or upgrading watsonx.ai

Ready to install or upgrade watsonx.ai?

  • To install watsonx.ai along with the other IBM® Software Hub services, see Installing IBM Software Hub.
  • To upgrade watsonx.ai along with the other IBM Software Hub services, see Upgrading IBM Software Hub.
  • To install or upgrade watsonx.ai independently, see watsonx.ai.
    Remember: All of the IBM Software Hub components associated with an instance of IBM Software Hub must be installed at the same version.

IBM Software Hub Version 5.1.2

A new version of watsonx.ai was released in March 2025 with IBM Software Hub 5.1.2.

Operand version: 10.2.0

This release includes the following changes:

New features
This release of watsonx.ai includes the following features:
Work with new foundation models in Prompt Lab
You can now use the following foundation models for inferencing from the API and from the Prompt Lab in watsonx.ai:
  • granite-3-2-8b-instruct
  • granite-vision-3-2-2b
  • mistral-small-24b-instruct-2501

For details, see Foundation models in watsonx.ai.

Deploy custom foundation models globally
Administrators can now deploy custom foundation models globally by using the watsonx.ai Inference Framework Manager (IFM) operator, which makes these models available for use in all projects and deployment spaces. Globally deployed models enable administrators to centrally manage and deploy custom models, while providing data scientists and AI builders with access to these models across multiple projects and spaces. These models can then be used for creating and deploying structured or freeform prompt templates in all projects and spaces, and can be used for text generation or inferencing.

To learn more about register custom foundation models for global deployment, see Registering custom foundation models for global deployment.

Enhanced interaction with deployed custom foundation models through chat API
You can now interact with your deployed custom foundation models through chat API. Chatting with a deployed custom foundation model provides you with a more natural and intuitive way to interact with the model, making it easier to ask questions, receive answers, and complete tasks. You can use the chat API to interact with your model for use cases such as customer service, language translation, and content generation to drive business value and improve user satisfaction.
Train, deploy, and inference custom foundation models that are fine-tuned with PEFT techniques
You can now train, deploy, inference, and manage your custom foundation models that are fine-tuned with Parameter-Efficient Fine-Tuning (PEFT) techniques in a more flexible way. By deploying non-quantized (LoRA) or quantized (QLoRA) models using PEFT techniques, you can save resources while taking advantage of the flexibility and customization options provided by using a custom foundation model.
Streamlined deployment for AutoAI for RAG experiments
From the AutoAI user interface, you can now save and deploy a RAG pattern as an AI service so that you can easily access the inferencing endpoint and test the pattern. This feature is available for RAG patterns developed using either the in-memory Chroma database or a Milvus database.

To read more about these features, see What's new and changed in watsonx.ai in the IBM watsonx™ documentation.

Updates
The following updates were introduced in this release:
Deploy foundation models on a specific GPU in a cluster with different GPU types
You can now deploy foundation models on a specific GPU type in a cluster that contains cluster nodes with different GPU types by setting the node selector attribute in your deployment.

For details, see Adding foundation models in watsonx.ai.

Install watsonx.ai with VMware vSphere
You can now install the IBM watsonx.ai service on the VMware vSphere platform with GPUs configured in passthrough mode.

For details, see Foundation models in watsonx.ai.

Issues fixed in this release
The following issues were fixed in this release:
The codestral-2501 foundation model is not removed after being uninstalled
  • Issue: After you follow the instructions to remove the codestral-2501 foundation model from your deployment, the model remains on your cluster.
  • Resolution: The codestral-2501 model is now removed after it is uninstalled.
Customer-reported issues fixed in this release
For a list of customer-reported issues that were fixed in this release, see the Fix List for IBM Cloud Pak® for Data on the IBM Support website.
Security issues fixed in this release
The following security issues were fixed in this release:

CVE-2025-0426, CVE-2025-22866, CVE-2025-22869

CVE-2024-3661, CVE-2024-6197, CVE-2024-6501, CVE-2024-9143, CVE-2024-11392, CVE-2024-11393, CVE-2024-11394, CVE-2024-45336, CVE-2024-45338, CVE-2024-45490, CVE-2024-52531

CVE-2023-27535, CVE-2023-27536, CVE-2023-27538, CVE-2023-44487, CVE-2023-52425

CVE-2022-1271, CVE-2022-40897

CVE-2021-22922, CVE-2021-22923

CVE-2020-11023

CVE-2019-3822, CVE-2019-3823, CVE-2019-5436, CVE-2019-11068, CVE-2019-13117, CVE-2019-13118

CVE-2018-0732, CVE-2018-0734, CVE-2018-0737, CVE-2018-16839, CVE-2018-16840, CVE-2018-16842

CVE-2017-0663, CVE-2017-3731, CVE-2017-3732, CVE-2017-3738, CVE-2017-7375, CVE-2017-9047, CVE-2017-9048, CVE-2017-18258

CVE-2016-0702, CVE-2016-0703, CVE-2016-0704, CVE-2016-0705, CVE-2016-0797, CVE-2016-0799, CVE-2016-1833, CVE-2016-1834, CVE-2016-1835, CVE-2016-1836, CVE-2016-1837, CVE-2016-1838, CVE-2016-1839, CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, CVE-2016-2108, CVE-2016-2109, CVE-2016-2178, CVE-2016-4447, CVE-2016-4448, CVE-2016-4449, CVE-2016-5131, CVE-2016-5419, CVE-2016-6302, CVE-2016-6306, CVE-2016-7056, CVE-2016-7141, CVE-2016-8610, CVE-2016-8615, CVE-2016-8616, CVE-2016-8617, CVE-2016-8618, CVE-2016-8619, CVE-2016-8621, CVE-2016-8622, CVE-2016-8623, CVE-2016-8624, CVE-2016-9318

CVE-2015-0204, CVE-2015-0205, CVE-2015-0206, CVE-2015-0209, CVE-2015-3194, CVE-2015-3195, CVE-2015-3196, CVE-2015-4000, CVE-2015-7497, CVE-2015-7941, CVE-2015-7942

Deprecated features
The following features were deprecated in this release:
Deprecated foundation models
The following models are now deprecated and will be withdrawn in a future release:
  • granite-8b-japanese
Withdrawn foundation models
The following models are now withdrawn from the watsonx.ai service:
  • codellama-34b-instruct-hf
  • granite-13b-chat-v2
  • granite-20b-multilingual
Deprecation of Federated Learning
Federated Learning is deprecated and will be removed in a future release.

For details, see Foundation model lifecycle.

IBM Software Hub Version 5.1.1

A new version of watsonx.ai was released in February 2025 with IBM Software Hub 5.1.1.

Operand version: 10.1.0

This release includes the following changes:

New features
This release of watsonx.ai includes the following features:
Save resources by training, deploying, and inferencing fine-tuned models with LoRA and QLoRA adapters

Fine tuning is the process of training a model on additional training data by updating the weights of the model, which results in a completely new model. Fine tuning is resource intensive process and normally requires you to have multiple GPUs due to memory requirements. To save resources, you can now use parameter-efficient fine tuning (PEFT) techniques such as low-rank adaptation (LoRA) and quantized low-rank adaptation (QLoRA) to train, deploy, and inference your fine-tuned models programmatically.

The following foundation models are now available for you to customize by using fine tuning techniques:

  • granite-3-1-8b-base
  • llama-3-1-8b
  • llama-3-1-70b
  • llama-3-1-70b-gptq
Deploy generative AI applications with AI services
You can now use AI services in watsonx.ai to deploy your applications. An AI service is a deployable unit of code that you can use to capture the logic of your generative AI use cases. While Python functions are the traditional way to deploy machine learning assets, AI services offer a more flexible option to deploy code for generative AI applications, such as streaming. When your AI services are successfully deployed, you can use the endpoint for inferencing from your application.
Deploy and inference DeepSeek-R1 distilled models with watsonx.ai for accelerated development
You can now use the distilled variants of DeepSeek-R1, a powerful open-sourced reasoning model, to securely deploy and inference DeepSeek-R1 models with watsonx.ai, which enabled you to accelerate the development of AI-powered solutions. The DeepSeek-R1 model can be deployed as a custom foundation model with watsonx.ai.
Enhancements for AutoAI for RAG experiments
These features for AutoAI RAG experiments are new with this release:
  • You can now add documents in for Markdown format for your document collections.
  • You can exercise greater control over chunking settings for creating RAG patterns.
  • Use either a standalone Milvus vector database or a Milvus database created with watsonx.ai for storing your indexed documents.
Work with new foundation models in Prompt Lab
You can now use the following foundation models for inferencing from the API and from the Prompt Lab in watsonx.ai:
  • codestral-2501
  • llama-3-3-70b-instruct
  • mistral-large-instruct-2411
  • pixtral-large-instruct-2411

For details, see Foundation models in watsonx.ai.

Work with new Granite embedding models for text matching and retrieval tasks
You can now use the following embedding models to vectorize text in multiple languages:
  • granite-embedding-107m-multilingual-rtrvr
  • granite-embedding-278m-multilingual-rtrvr

For details, see Foundation models in watsonx.ai.

Use IBM Granite time series foundation models and the watsonx.ai API to forecast future values
Use the new time series API to pass historical data observations to an IBM Granite time series foundation model that can forecast future values with zero-shot inferencing. You can now work with the following time series models provided by IBM:
  • granite-ttm-512-96-r2
  • granite-ttm-1024-96-r2
  • granite-ttm-1536-96-r2

To read more about these features, see What's new and changed in watsonx.ai in the IBM watsonx documentation.

Updates
The following updates were introduced in this release:
Use the text extraction API to process more file types, including files added directly in the API request body
You can extract text from the following file types in addition to PDF files:
  • GIF
  • JPG
  • PNG
  • TIFF
New versions of the Granite Instruct foundation models
The granite-3-2b-instruct and granite-3-8b-instruct foundation models are updated to version 1.1.0. The latest modifications can handle larger prompts and provide better support for coding tasks. The context window length (input + output) for prompts is increased to 131,072 tokens.
New versions of the Granite Guardian foundation models
The granite-guardian-3-2b and granite-guardian-3-8b foundation models are updated to version 1.1.0. The latest versions of the models are trained with additional synthetic data to improve performance for risks that are related to hallucination and jailbreak. The context window length (input + output) for prompts is increased to 131,072 tokens.
Issues fixed in this release
The following issues were fixed in this release:
Duplicate file names generate an error when training an AutoAI RAG pattern
  • Issue: The following message is generated during training: AutoAI RAG experiment failed with: Not unique document file names passed in connections.
  • Resolution: Remove any duplicate files or rename files with different content but the same file name before you run the experiment.
AutoAI RAG experiment can fail because too many tokens are submitted for some models
  • Issue: If you are running an AutoAI experiment for retrieval-augmented generation (RAG), the experiment might fail with this error:
    Failure during generate. (POST [Internal URL]\nStatus code: 400, body: 
    {"errors":[{"code":"invalid_input_argument","message":"Invalid input argument for Model 
    \'google/flan-ul2\': the number of input tokens 5601 cannot exceed the total tokens limit 
    4096 for this model
  • Resolution: To resolve the issue, open the Experiment settings page for the experiment and try these configuration changes:
    • Deselect the smallest foundation model available for the experiment.
    • Disable the window retrieval method.
    Run the experiment again.
Customer-reported issues fixed in this release
For a list of customer-reported issues that were fixed in this release, see the Fix List for IBM Cloud Pak for Data on the IBM Support website.
Security issues fixed in this release
The following security issues were fixed in this release:

CVE-2025-21502, CVE-2025-21613, CVE-2025-21614

CVE-2024-0340, CVE-2024-0397, CVE-2024-0443, CVE-2024-0444, CVE-2024-0450, CVE-2024-0564, CVE-2024-0607, CVE-2024-0639, CVE-2024-0641, CVE-2024-0727, CVE-2024-0775, CVE-2024-1151, CVE-2024-2236, CVE-2024-3056, CVE-2024-3177, CVE-2024-3568, CVE-2024-3596, CVE-2024-3651, CVE-2024-3661, CVE-2024-4032, CVE-2024-4453, CVE-2024-4603, CVE-2024-4741, CVE-2024-5187, CVE-2024-5321, CVE-2024-6119, CVE-2024-6232, CVE-2024-6239, CVE-2024-6345, CVE-2024-6501, CVE-2024-6602, CVE-2024-6655, CVE-2024-7006, CVE-2024-7347, CVE-2024-7531, CVE-2024-7592, CVE-2024-8088,CVE-2024-9287, CVE-2024-10041, CVE-2024-10220, CVE-2024-10963, CVE-2024-11079, CVE-2024-11168, CVE-2024-12254, CVE-2024-12798, CVE-2024-12801, CVE-2024-21068, CVE-2024-21538, CVE-2024-21823, CVE-2024-22099, CVE-2024-22667, CVE-2024-23196, CVE-2024-23254, CVE-2024-23263, CVE-2024-23280, CVE-2024-23284, CVE-2024-23307, CVE-2024-23848, CVE-2024-24789, CVE-2024-24855, CVE-2024-24857, CVE-2024-24858, CVE-2024-24859, CVE-2024-25062, CVE-2024-25260, CVE-2024-25739, CVE-2024-25740, CVE-2024-25744, CVE-2024-26458, CVE-2024-26461, CVE-2024-26462, CVE-2024-26589, CVE-2024-26591, CVE-2024-26595, CVE-2024-26598, CVE-2024-26601, CVE-2024-26603, CVE-2024-26605, CVE-2024-26611, CVE-2024-26612, CVE-2024-26614, CVE-2024-26615, CVE-2024-26618, CVE-2024-26621, CVE-2024-26629, CVE-2024-26630, CVE-2024-26631, CVE-2024-26637, CVE-2024-26638, CVE-2024-26640, CVE-2024-26641, CVE-2024-26645, CVE-2024-26646, CVE-2024-26647, CVE-2024-26648, CVE-2024-26649, CVE-2024-26650, CVE-2024-26656, CVE-2024-26660, CVE-2024-26661, CVE-2024-26662, CVE-2024-26663, CVE-2024-26664, CVE-2024-26666, CVE-2024-26668, CVE-2024-26669, CVE-2024-26670, CVE-2024-26672, CVE-2024-26674, CVE-2024-26675, CVE-2024-26678, CVE-2024-26679, CVE-2024-26680, CVE-2024-26681, CVE-2024-26682, CVE-2024-26683, CVE-2024-26686, CVE-2024-26687, CVE-2024-26689, CVE-2024-26691, CVE-2024-26695, CVE-2024-26698, CVE-2024-26700, CVE-2024-26704, CVE-2024-26707, CVE-2024-26708, CVE-2024-26712, CVE-2024-26714, CVE-2024-26715, CVE-2024-26717, CVE-2024-26719, CVE-2024-26721, CVE-2024-26725, CVE-2024-26733, CVE-2024-26734, CVE-2024-26739, CVE-2024-26740, CVE-2024-26742, CVE-2024-26743, CVE-2024-26744, CVE-2024-26746, CVE-2024-26751, CVE-2024-26757, CVE-2024-26758, CVE-2024-26759, CVE-2024-26760, CVE-2024-26761, CVE-2024-26763, CVE-2024-26767, CVE-2024-26769, CVE-2024-26770, CVE-2024-26771, CVE-2024-26772, CVE-2024-26774, CVE-2024-26775, CVE-2024-26776, CVE-2024-26777, CVE-2024-26778, CVE-2024-26779, CVE-2024-26782, CVE-2024-26785, CVE-2024-26786, CVE-2024-26803, CVE-2024-26810, CVE-2024-26812, CVE-2024-26815, CVE-2024-26820, CVE-2024-26826, CVE-2024-26828, CVE-2024-26830, CVE-2024-26831, CVE-2024-26835, CVE-2024-26837, CVE-2024-26838, CVE-2024-26840, CVE-2024-26843, CVE-2024-26844, CVE-2024-26845, CVE-2024-26846, CVE-2024-26851, CVE-2024-26854, CVE-2024-26857, CVE-2024-26859, CVE-2024-26861, CVE-2024-26862, CVE-2024-26863, CVE-2024-26870, CVE-2024-26872, CVE-2024-26878, CVE-2024-26882, CVE-2024-26883, CVE-2024-26889, CVE-2024-26890, CVE-2024-26891, CVE-2024-26892, CVE-2024-26894, CVE-2024-26899, CVE-2024-26900, CVE-2024-26901, CVE-2024-26902, CVE-2024-26903, CVE-2024-26906, CVE-2024-26907, CVE-2024-26915, CVE-2024-26918, CVE-2024-26920, CVE-2024-26921, CVE-2024-26922, CVE-2024-26923, CVE-2024-26924, CVE-2024-26926, CVE-2024-26927, CVE-2024-26928, CVE-2024-26933, CVE-2024-26934, CVE-2024-26937, CVE-2024-26938, CVE-2024-26939, CVE-2024-26940, CVE-2024-26945, CVE-2024-26950, CVE-2024-26951, CVE-2024-26953, CVE-2024-26958, CVE-2024-26960, CVE-2024-26961, CVE-2024-26962, CVE-2024-26964, CVE-2024-26973, CVE-2024-26975, CVE-2024-26976, CVE-2024-26979, CVE-2024-26984, CVE-2024-26987, CVE-2024-26988, CVE-2024-26989, CVE-2024-26990, CVE-2024-26991, CVE-2024-26992, CVE-2024-26999, CVE-2024-27003, CVE-2024-27004, CVE-2024-27008, CVE-2024-27010, CVE-2024-27011, CVE-2024-27012, CVE-2024-27013, CVE-2024-27014, CVE-2024-27015, CVE-2024-27017, CVE-2024-27023, CVE-2024-27025, CVE-2024-27026, CVE-2024-27027, CVE-2024-27031, CVE-2024-27038, CVE-2024-27039, CVE-2024-27042, CVE-2024-27048, CVE-2024-27055, CVE-2024-27056, CVE-2024-27057, CVE-2024-27059, CVE-2024-27062, CVE-2024-27065, CVE-2024-27073, CVE-2024-27077, CVE-2024-27079, CVE-2024-27389, CVE-2024-27390, CVE-2024-27393, CVE-2024-27395, CVE-2024-27398, CVE-2024-27399, CVE-2024-27403, CVE-2024-27404, CVE-2024-27410, CVE-2024-27413, CVE-2024-27414, CVE-2024-27431, CVE-2024-27436, CVE-2024-27437, CVE-2024-29040, CVE-2024-31076, CVE-2024-34397, CVE-2024-35195, CVE-2024-35787, CVE-2024-35790, CVE-2024-35794, CVE-2024-35795, CVE-2024-35801, CVE-2024-35802, CVE-2024-35803, CVE-2024-35804, CVE-2024-35805, CVE-2024-35807, CVE-2024-35808, CVE-2024-35809, CVE-2024-35810, CVE-2024-35812, CVE-2024-35814, CVE-2024-35817, CVE-2024-35822, CVE-2024-35824, CVE-2024-35827, CVE-2024-35831, CVE-2024-35834, CVE-2024-35835, CVE-2024-35836, CVE-2024-35838, CVE-2024-35840, CVE-2024-35843, CVE-2024-35847, CVE-2024-35853, CVE-2024-35854, CVE-2024-35855, CVE-2024-35859, CVE-2024-35860, CVE-2024-35861, CVE-2024-35862, CVE-2024-35863, CVE-2024-35864, CVE-2024-35865, CVE-2024-35866, CVE-2024-35867, CVE-2024-35868, CVE-2024-35869, CVE-2024-35872, CVE-2024-35876, CVE-2024-35877, CVE-2024-35878, CVE-2024-35879, CVE-2024-35880, CVE-2024-35886, CVE-2024-35888, CVE-2024-35891, CVE-2024-35892, CVE-2024-35894, CVE-2024-35900, CVE-2024-35901, CVE-2024-35903, CVE-2024-35904, CVE-2024-35905, CVE-2024-35908, CVE-2024-35912, CVE-2024-35913, CVE-2024-35917, CVE-2024-35918, CVE-2024-35922, CVE-2024-35923, CVE-2024-35924, CVE-2024-35925, CVE-2024-35927, CVE-2024-35928, CVE-2024-35929, CVE-2024-35930, CVE-2024-35931, CVE-2024-35933, CVE-2024-35934, CVE-2024-35938, CVE-2024-35939, CVE-2024-35942, CVE-2024-35944, CVE-2024-35945, CVE-2024-35946, CVE-2024-35947, CVE-2024-35950, CVE-2024-35952, CVE-2024-35954, CVE-2024-35957, CVE-2024-35959, CVE-2024-35963, CVE-2024-35964, CVE-2024-35965, CVE-2024-35966, CVE-2024-35967, CVE-2024-35972, CVE-2024-35973, CVE-2024-35974, CVE-2024-35976, CVE-2024-35978, CVE-2024-35979, CVE-2024-35980, CVE-2024-35981, CVE-2024-35983, CVE-2024-35989, CVE-2024-35991, CVE-2024-35995, CVE-2024-35998, CVE-2024-35999, CVE-2024-36002, CVE-2024-36006, CVE-2024-36007, CVE-2024-36008, CVE-2024-36010, CVE-2024-36011, CVE-2024-36012, CVE-2024-36013, CVE-2024-36015, CVE-2024-36021, CVE-2024-36022, CVE-2024-36028, CVE-2024-36030, CVE-2024-36031, CVE-2024-36286, CVE-2024-36477, CVE-2024-36489, CVE-2024-36880, CVE-2024-36881, CVE-2024-36882, CVE-2024-36884, CVE-2024-36885, CVE-2024-36889, CVE-2024-36891, CVE-2024-36893, CVE-2024-36896, CVE-2024-36898, CVE-2024-36899, CVE-2024-36901, CVE-2024-36902, CVE-2024-36903, CVE-2024-36905, CVE-2024-36906, CVE-2024-36909, CVE-2024-36910, CVE-2024-36911, CVE-2024-36917, CVE-2024-36918, CVE-2024-36919, CVE-2024-36920, CVE-2024-36921, CVE-2024-36922, CVE-2024-36926, CVE-2024-36927, CVE-2024-36928, CVE-2024-36930, CVE-2024-36932, CVE-2024-36933, CVE-2024-36936, CVE-2024-36937, CVE-2024-36938, CVE-2024-36939, CVE-2024-36940, CVE-2024-36944, CVE-2024-36945, CVE-2024-36949, CVE-2024-36950, CVE-2024-36954, CVE-2024-36955, CVE-2024-36956, CVE-2024-36960, CVE-2024-36961, CVE-2024-36962, CVE-2024-36966, CVE-2024-36967, CVE-2024-36968, CVE-2024-36970, CVE-2024-36974, CVE-2024-36975, CVE-2024-36977, CVE-2024-36978, CVE-2024-37891, CVE-2024-38384, CVE-2024-38388, CVE-2024-38541, CVE-2024-38555, CVE-2024-38556, CVE-2024-38559, CVE-2024-38561, CVE-2024-38564, CVE-2024-38566, CVE-2024-38573, CVE-2024-38581, CVE-2024-38588, CVE-2024-38594, CVE-2024-38596, CVE-2024-38598, CVE-2024-38600, CVE-2024-38601, CVE-2024-38604, CVE-2024-38605, CVE-2024-38606, CVE-2024-38607, CVE-2024-38612, CVE-2024-38615, CVE-2024-38618, CVE-2024-38619, CVE-2024-38627, CVE-2024-38629, CVE-2024-38632, CVE-2024-38635, CVE-2024-39276, CVE-2024-39291, CVE-2024-39298, CVE-2024-39468, CVE-2024-39471, CVE-2024-39472, CVE-2024-39473, CVE-2024-39474, CVE-2024-39479, CVE-2024-39480, CVE-2024-39483, CVE-2024-39486, CVE-2024-39487, CVE-2024-39488, CVE-2024-39490, CVE-2024-39491, CVE-2024-39493, CVE-2024-39494, CVE-2024-39497, CVE-2024-39498, CVE-2024-39499, CVE-2024-39500, CVE-2024-39501, CVE-2024-39502, CVE-2024-39503, CVE-2024-39504, CVE-2024-39507, CVE-2024-39508, CVE-2024-39509, CVE-2024-39920, CVE-2024-40866, CVE-2024-40900, CVE-2024-40901, CVE-2024-40903, CVE-2024-40904, CVE-2024-40906, CVE-2024-40907, CVE-2024-40908, CVE-2024-40913, CVE-2024-40919, CVE-2024-40922, CVE-2024-40923, CVE-2024-40924, CVE-2024-40925, CVE-2024-40929, CVE-2024-40930, CVE-2024-40931, CVE-2024-40935, CVE-2024-40936, CVE-2024-40937, CVE-2024-40939, CVE-2024-40940, CVE-2024-40941, CVE-2024-40945, CVE-2024-40948, CVE-2024-40956, CVE-2024-40959, CVE-2024-40960, CVE-2024-40964, CVE-2024-40965, CVE-2024-40966, CVE-2024-40967, CVE-2024-40972, CVE-2024-40974, CVE-2024-40977, CVE-2024-40978, CVE-2024-40980, CVE-2024-40988, CVE-2024-40989, CVE-2024-40990, CVE-2024-40992, CVE-2024-40994, CVE-2024-40995, CVE-2024-40997, CVE-2024-40998, CVE-2024-40999, CVE-2024-41000, CVE-2024-41001, CVE-2024-41003, CVE-2024-41004, CVE-2024-41005, CVE-2024-41007, CVE-2024-41008, CVE-2024-41009, CVE-2024-41010, CVE-2024-41012, CVE-2024-41013, CVE-2024-41014, CVE-2024-41020, CVE-2024-41023, CVE-2024-41031, CVE-2024-41032, CVE-2024-41035, CVE-2024-41037, CVE-2024-41038, CVE-2024-41039, CVE-2024-41042, CVE-2024-41045, CVE-2024-41047, CVE-2024-41049, CVE-2024-41056, CVE-2024-41057, CVE-2024-41058, CVE-2024-41060, CVE-2024-41062, CVE-2024-41063, CVE-2024-41064, CVE-2024-41065, CVE-2024-41066, CVE-2024-41068, CVE-2024-41069, CVE-2024-41071, CVE-2024-41072, CVE-2024-41077, CVE-2024-41079, CVE-2024-41082, CVE-2024-41084, CVE-2024-41085, CVE-2024-41087, CVE-2024-41089, CVE-2024-41090, CVE-2024-41091, CVE-2024-41092, CVE-2024-41093, CVE-2024-41094, CVE-2024-41095, CVE-2024-41097, CVE-2024-41098, CVE-2024-41957, CVE-2024-41965, CVE-2024-42063, CVE-2024-42067, CVE-2024-42068, CVE-2024-42069, CVE-2024-42070, CVE-2024-42071, CVE-2024-42073, CVE-2024-42076, CVE-2024-42078, CVE-2024-42079, CVE-2024-42080, CVE-2024-42083, CVE-2024-42084, CVE-2024-42085, CVE-2024-42090, CVE-2024-42094, CVE-2024-42097, CVE-2024-42098, CVE-2024-42101, CVE-2024-42106, CVE-2024-42107, CVE-2024-42109, CVE-2024-42114, CVE-2024-42116, CVE-2024-42123, CVE-2024-42124, CVE-2024-42125, CVE-2024-42126, CVE-2024-42129, CVE-2024-42132, CVE-2024-42133, CVE-2024-42135, CVE-2024-42136, CVE-2024-42138, CVE-2024-42139, CVE-2024-42141, CVE-2024-42145, CVE-2024-42148, CVE-2024-42151, CVE-2024-42154, CVE-2024-42159, CVE-2024-42161, CVE-2024-42162, CVE-2024-42224, CVE-2024-42225, CVE-2024-42226, CVE-2024-42228, CVE-2024-42229, CVE-2024-42230, CVE-2024-42232, CVE-2024-42237, CVE-2024-42238, CVE-2024-42239, CVE-2024-42240, CVE-2024-42241, CVE-2024-42243, CVE-2024-42244, CVE-2024-42245, CVE-2024-42253, CVE-2024-42258, CVE-2024-42259, CVE-2024-42265, CVE-2024-42268, CVE-2024-42271, CVE-2024-42272, CVE-2024-42276, CVE-2024-42278, CVE-2024-42281, CVE-2024-42283, CVE-2024-42284, CVE-2024-42285, CVE-2024-42286, CVE-2024-42287, CVE-2024-42288, CVE-2024-42289, CVE-2024-42290, CVE-2024-42291, CVE-2024-42292, CVE-2024-42294, CVE-2024-42301, CVE-2024-42302, CVE-2024-42304, CVE-2024-42305, CVE-2024-42312, CVE-2024-42315, CVE-2024-42316, CVE-2024-42317, CVE-2024-42321, CVE-2024-42322, CVE-2024-43374, CVE-2024-43790, CVE-2024-43800, CVE-2024-43802, CVE-2024-43816, CVE-2024-43817, CVE-2024-43820, CVE-2024-43821, CVE-2024-43823, CVE-2024-43826, CVE-2024-43828, CVE-2024-43829, CVE-2024-43830, CVE-2024-43834, CVE-2024-43835, CVE-2024-43840, CVE-2024-43842, CVE-2024-43846, CVE-2024-43853, CVE-2024-43854, CVE-2024-43855, CVE-2024-43856, CVE-2024-43861, CVE-2024-43863, CVE-2024-43865, CVE-2024-43866, CVE-2024-43869, CVE-2024-43870, CVE-2024-43871, CVE-2024-43873, CVE-2024-43874, CVE-2024-43879, CVE-2024-43880, CVE-2024-43882, CVE-2024-43884, CVE-2024-43888, CVE-2024-43889, CVE-2024-43890, CVE-2024-43892, CVE-2024-43893, CVE-2024-43894, CVE-2024-43896, CVE-2024-43898, CVE-2024-43906, CVE-2024-43908, CVE-2024-43910, CVE-2024-43911, CVE-2024-43912, CVE-2024-43914, CVE-2024-44185, CVE-2024-44187, CVE-2024-44244, CVE-2024-44296, CVE-2024-44309, CVE-2024-44931, CVE-2024-44932, CVE-2024-44934, CVE-2024-44935, CVE-2024-44944, CVE-2024-44947, CVE-2024-44952, CVE-2024-44954, CVE-2024-44957, CVE-2024-44958, CVE-2024-44960, CVE-2024-44961, CVE-2024-44964, CVE-2024-44965, CVE-2024-44967, CVE-2024-44970, CVE-2024-44974, CVE-2024-44975, CVE-2024-44977, CVE-2024-44983, CVE-2024-44984, CVE-2024-44985, CVE-2024-44986, CVE-2024-44987, CVE-2024-44989, CVE-2024-44990, CVE-2024-44994, CVE-2024-44996, CVE-2024-44998, CVE-2024-45000, CVE-2024-45001, CVE-2024-45003, CVE-2024-45005, CVE-2024-45006, CVE-2024-45008, CVE-2024-45009, CVE-2024-45010, CVE-2024-45012, CVE-2024-45013, CVE-2024-45016, CVE-2024-45017, CVE-2024-45018, CVE-2024-45019, CVE-2024-45020, CVE-2024-45022, CVE-2024-45025, CVE-2024-45026, CVE-2024-45027, CVE-2024-45029, CVE-2024-45306, CVE-2024-45337, CVE-2024-45338, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2024-46672, CVE-2024-46673, CVE-2024-46675, CVE-2024-46678, CVE-2024-46679, CVE-2024-46681, CVE-2024-46689, CVE-2024-46692, CVE-2024-46695, CVE-2024-46697, CVE-2024-46698, CVE-2024-46706, CVE-2024-46707, CVE-2024-46709, CVE-2024-46710, CVE-2024-46711, CVE-2024-46713, CVE-2024-46715, CVE-2024-46717, CVE-2024-46719, CVE-2024-46720, CVE-2024-46722, CVE-2024-46723, CVE-2024-46724, CVE-2024-46725, CVE-2024-46736, CVE-2024-46737, CVE-2024-46738, CVE-2024-46739, CVE-2024-46743, CVE-2024-46744, CVE-2024-46745, CVE-2024-46746, CVE-2024-46747, CVE-2024-46748, CVE-2024-46750, CVE-2024-46754, CVE-2024-46755, CVE-2024-46756, CVE-2024-46758, CVE-2024-46759, CVE-2024-46760, CVE-2024-46761, CVE-2024-46762, CVE-2024-46765, CVE-2024-46766, CVE-2024-46767, CVE-2024-46770, CVE-2024-46771, CVE-2024-46774, CVE-2024-46777, CVE-2024-46783, CVE-2024-46784, CVE-2024-46786, CVE-2024-46787, CVE-2024-46788, CVE-2024-46791, CVE-2024-46793, CVE-2024-46794, CVE-2024-46796, CVE-2024-46797, CVE-2024-46798, CVE-2024-46800, CVE-2024-46805, CVE-2024-46806, CVE-2024-46807, CVE-2024-46819, CVE-2024-46820, CVE-2024-46822, CVE-2024-46823, CVE-2024-46824, CVE-2024-46825, CVE-2024-46826, CVE-2024-46828, CVE-2024-46830, CVE-2024-46834, CVE-2024-46835, CVE-2024-46839, CVE-2024-46842, CVE-2024-46845, CVE-2024-46853, CVE-2024-46855, CVE-2024-46857, CVE-2024-46858, CVE-2024-46859, CVE-2024-46860, CVE-2024-46861, CVE-2024-46862, CVE-2024-46863, CVE-2024-46864, CVE-2024-46871, CVE-2024-47175, CVE-2024-47535, CVE-2024-47538, CVE-2024-47541, CVE-2024-47542, CVE-2024-47554, CVE-2024-47600, CVE-2024-47607, CVE-2024-47615, CVE-2024-47660, CVE-2024-47668, CVE-2024-47671, CVE-2024-47672, CVE-2024-47673, CVE-2024-47674, CVE-2024-47675, CVE-2024-47678, CVE-2024-47679, CVE-2024-47682, CVE-2024-47684, CVE-2024-47685, CVE-2024-47687, CVE-2024-47692, CVE-2024-47693, CVE-2024-47696, CVE-2024-47700, CVE-2024-47701, CVE-2024-47702, CVE-2024-47703, CVE-2024-47705, CVE-2024-47706, CVE-2024-47707, CVE-2024-47710, CVE-2024-47713, CVE-2024-47715, CVE-2024-47718, CVE-2024-47719, CVE-2024-47727, CVE-2024-47728, CVE-2024-47734, CVE-2024-47737, CVE-2024-47738, CVE-2024-47739, CVE-2024-47745, CVE-2024-47748, CVE-2024-47749, CVE-2024-47814, CVE-2024-47835, CVE-2024-49851, CVE-2024-49855, CVE-2024-49856, CVE-2024-49860, CVE-2024-49861, CVE-2024-49862, CVE-2024-49864, CVE-2024-49866, CVE-2024-49870, CVE-2024-49875, CVE-2024-49878, CVE-2024-49880, CVE-2024-49881, CVE-2024-49882, CVE-2024-49883, CVE-2024-49884, CVE-2024-49885, CVE-2024-49886, CVE-2024-49888, CVE-2024-49889, CVE-2024-49891, CVE-2024-49904, CVE-2024-49925, CVE-2024-49927, CVE-2024-49928, CVE-2024-49929, CVE-2024-49930, CVE-2024-49933, CVE-2024-49934, CVE-2024-49935, CVE-2024-49937, CVE-2024-49938, CVE-2024-49939, CVE-2024-49940, CVE-2024-49944, CVE-2024-49946, CVE-2024-49948, CVE-2024-49949, CVE-2024-49950, CVE-2024-49951, CVE-2024-49952, CVE-2024-49953, CVE-2024-49954, CVE-2024-49955, CVE-2024-49959, CVE-2024-49960, CVE-2024-49962, CVE-2024-49967, CVE-2024-49968, CVE-2024-49971, CVE-2024-49973, CVE-2024-49974, CVE-2024-49975, CVE-2024-49976, CVE-2024-49977, CVE-2024-49978, CVE-2024-49983, CVE-2024-49991, CVE-2024-49993, CVE-2024-49994, CVE-2024-49995, CVE-2024-49999, CVE-2024-50000, CVE-2024-50001, CVE-2024-50002, CVE-2024-50006, CVE-2024-50007, CVE-2024-50008, CVE-2024-50009, CVE-2024-50010, CVE-2024-50012, CVE-2024-50013, CVE-2024-50014, CVE-2024-50015, CVE-2024-50018, CVE-2024-50019, CVE-2024-50020, CVE-2024-50021, CVE-2024-50022, CVE-2024-50023, CVE-2024-50024, CVE-2024-50027, CVE-2024-50028, CVE-2024-50029, CVE-2024-50033, CVE-2024-50035, CVE-2024-50036, CVE-2024-50038, CVE-2024-50039, CVE-2024-50040, CVE-2024-50041, CVE-2024-50042, CVE-2024-50044, CVE-2024-50045, CVE-2024-50046, CVE-2024-50047, CVE-2024-50048, CVE-2024-50055, CVE-2024-50057, CVE-2024-50058, CVE-2024-50060, CVE-2024-50063, CVE-2024-50064, CVE-2024-50067, CVE-2024-50073, CVE-2024-50074, CVE-2024-50075, CVE-2024-50076, CVE-2024-50077, CVE-2024-50078, CVE-2024-50081, CVE-2024-50082, CVE-2024-50083, CVE-2024-50093, CVE-2024-50095, CVE-2024-50099, CVE-2024-50101, CVE-2024-50102, CVE-2024-50106, CVE-2024-50107, CVE-2024-50109, CVE-2024-50110, CVE-2024-50114, CVE-2024-50115, CVE-2024-50117, CVE-2024-50120, CVE-2024-50121, CVE-2024-50124, CVE-2024-50125, CVE-2024-50126, CVE-2024-50127, CVE-2024-50128, CVE-2024-50131, CVE-2024-50135, CVE-2024-50136, CVE-2024-50138, CVE-2024-50139, CVE-2024-50141, CVE-2024-50142, CVE-2024-50143, CVE-2024-50145, CVE-2024-50146, CVE-2024-50147, CVE-2024-50148, CVE-2024-50150, CVE-2024-50151, CVE-2024-50152, CVE-2024-50153, CVE-2024-50154, CVE-2024-50155, CVE-2024-50157, CVE-2024-50158, CVE-2024-50160, CVE-2024-50162, CVE-2024-50163, CVE-2024-50164, CVE-2024-50165, CVE-2024-50167, CVE-2024-50169, CVE-2024-50172, CVE-2024-50179, CVE-2024-50182, CVE-2024-50183, CVE-2024-50185, CVE-2024-50186, CVE-2024-50189, CVE-2024-50191, CVE-2024-50192, CVE-2024-50194, CVE-2024-50195, CVE-2024-50197, CVE-2024-50199, CVE-2024-50200, CVE-2024-50201, CVE-2024-50207, CVE-2024-50208, CVE-2024-50209, CVE-2024-50211, CVE-2024-50215, CVE-2024-50216, CVE-2024-50219, CVE-2024-50223, CVE-2024-50226, CVE-2024-50228, CVE-2024-50235, CVE-2024-50236, CVE-2024-50237, CVE-2024-50250, CVE-2024-50251, CVE-2024-50252, CVE-2024-50255, CVE-2024-50256, CVE-2024-50258, CVE-2024-50259, CVE-2024-50261, CVE-2024-50262, CVE-2024-50264, CVE-2024-50267, CVE-2024-50268, CVE-2024-50271, CVE-2024-50272, CVE-2024-50274, CVE-2024-50275, CVE-2024-50277, CVE-2024-50278, CVE-2024-50279, CVE-2024-50280, CVE-2024-50282, CVE-2024-50294, CVE-2024-50299, CVE-2024-50301, CVE-2024-50302, CVE-2024-50303, CVE-2024-50304, CVE-2024-50602, CVE-2024-50612, CVE-2024-50613, CVE-2024-52303, CVE-2024-52304, CVE-2024-52530, CVE-2024-52531, CVE-2024-52532, CVE-2024-52615, CVE-2024-52616, CVE-2024-52798, CVE-2024-53042, CVE-2024-53044, CVE-2024-53045, CVE-2024-53047, CVE-2024-53048, CVE-2024-53050, CVE-2024-53051, CVE-2024-53052, CVE-2024-53054, CVE-2024-53055, CVE-2024-53057, CVE-2024-53059, CVE-2024-53060, CVE-2024-53064, CVE-2024-53066, CVE-2024-53070, CVE-2024-53072, CVE-2024-53073, CVE-2024-53074, CVE-2024-53079, CVE-2024-53082, CVE-2024-53085, CVE-2024-53088, CVE-2024-53090, CVE-2024-53091, CVE-2024-53093, CVE-2024-53094, CVE-2024-53095, CVE-2024-53096, CVE-2024-53097, CVE-2024-53099, CVE-2024-53100, CVE-2024-53102, CVE-2024-53103, CVE-2024-53104, CVE-2024-53105, CVE-2024-53109, CVE-2024-53110, CVE-2024-53113, CVE-2024-53114, CVE-2024-53117, CVE-2024-53118, CVE-2024-53119, CVE-2024-53120, CVE-2024-53121, CVE-2024-53122, CVE-2024-53123, CVE-2024-53124, CVE-2024-53125, CVE-2024-53134, CVE-2024-53135, CVE-2024-53136, CVE-2024-53138, CVE-2024-53140, CVE-2024-53141, CVE-2024-53142, CVE-2024-53240, CVE-2024-53241, CVE-2024-53920, CVE-2024-53981, CVE-2024-54479, CVE-2024-54502, CVE-2024-54505, CVE-2024-54508, CVE-2024-54534, CVE-2024-55565, CVE-2024-56201, CVE-2024-56326, CVE-2024-56378, CVE-2024-56431, CVE-2024-56826, CVE-2024-56827

CVE-2023-0045, CVE-2023-0049, CVE-2023-0051, CVE-2023-0054, CVE-2023-0215, CVE-2023-0286, CVE-2023-0288, CVE-2023-0433, CVE-2023-0464, CVE-2023-0465, CVE-2023-0466, CVE-2023-0512, CVE-2023-1077, CVE-2023-1118, CVE-2023-1127, CVE-2023-1170, CVE-2023-1175, CVE-2023-1264, CVE-2023-1380, CVE-2023-1513, CVE-2023-1579, CVE-2023-1838, CVE-2023-1916, CVE-2023-1972, CVE-2023-2019, CVE-2023-2156, CVE-2023-2162, CVE-2023-2609, CVE-2023-2610, CVE-2023-2650, CVE-2023-3006, CVE-2023-3164, CVE-2023-3446, CVE-2023-3640, CVE-2023-3817, CVE-2023-4387, CVE-2023-4459, CVE-2023-4504, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4750, CVE-2023-4751, CVE-2023-4752, CVE-2023-4781, CVE-2023-5090, CVE-2023-5197, CVE-2023-5344, CVE-2023-5441, CVE-2023-5535, CVE-2023-5678,CVE-2023-6277, CVE-2023-7042,CVE-2023-7192, CVE-2023-24056, CVE-2023-25433, CVE-2023-25434, CVE-2023-25435, CVE-2023-28327, CVE-2023-28746, CVE-2023-31082, CVE-2023-31085, CVE-2023-32681, CVE-2023-37454, CVE-2023-39327, CVE-2023-39328, CVE-2023-39329, CVE-2023-39742, CVE-2023-39804, CVE-2023-43804, CVE-2023-45288, CVE-2023-45803, CVE-2023-45862, CVE-2023-46246, CVE-2023-47233, CVE-2023-48161, CVE-2023-48231, CVE-2023-48232, CVE-2023-48233, CVE-2023-48234, CVE-2023-48235, CVE-2023-48236, CVE-2023-48237, CVE-2023-48706, CVE-2023-51767, CVE-2023-52355, CVE-2023-52356, CVE-2023-52445, CVE-2023-52447, CVE-2023-52450, CVE-2023-52451, CVE-2023-52452, CVE-2023-52455, CVE-2023-52462, CVE-2023-52464, CVE-2023-52465, CVE-2023-52466, CVE-2023-52467, CVE-2023-52468, CVE-2023-52469, CVE-2023-52470, CVE-2023-52472, CVE-2023-52473, CVE-2023-52474, CVE-2023-52475, CVE-2023-52477, CVE-2023-52478, CVE-2023-52481, CVE-2023-52482, CVE-2023-52484, CVE-2023-52486, CVE-2023-52487, CVE-2023-52492, CVE-2023-52498, CVE-2023-52501, CVE-2023-52508, CVE-2023-52513, CVE-2023-52516, CVE-2023-52518, CVE-2023-52519, CVE-2023-52520, CVE-2023-52523, CVE-2023-52528, CVE-2023-52532, CVE-2023-52560, CVE-2023-52565, CVE-2023-52568, CVE-2023-52570, CVE-2023-52575, CVE-2023-52582, CVE-2023-52583, CVE-2023-52585, CVE-2023-52594, CVE-2023-52595, CVE-2023-52598, CVE-2023-52605, CVE-2023-52606, CVE-2023-52614, CVE-2023-52615, CVE-2023-52619, CVE-2023-52621, CVE-2023-52622, CVE-2023-52623, CVE-2023-52624, CVE-2023-52625, CVE-2023-52628, CVE-2023-52630, CVE-2023-52632, CVE-2023-52634, CVE-2023-52635, CVE-2023-52637, CVE-2023-52643, CVE-2023-52646, CVE-2023-52648, CVE-2023-52649, CVE-2023-52650, CVE-2023-52653, CVE-2023-52654, CVE-2023-52656, CVE-2023-52658, CVE-2023-52659, CVE-2023-52661, CVE-2023-52662, CVE-2023-52663, CVE-2023-52664, CVE-2023-52669, CVE-2023-52672, CVE-2023-52674, CVE-2023-52675, CVE-2023-52676, CVE-2023-52679, CVE-2023-52680, CVE-2023-52683, CVE-2023-52686, CVE-2023-52689, CVE-2023-52690, CVE-2023-52696, CVE-2023-52697, CVE-2023-52698, CVE-2023-52700, CVE-2023-52702, CVE-2023-52703, CVE-2023-52704, CVE-2023-52706, CVE-2023-52730, CVE-2023-52731, CVE-2023-52732, CVE-2023-52734, CVE-2023-52735, CVE-2023-52736, CVE-2023-52738, CVE-2023-52739, CVE-2023-52740, CVE-2023-52743, CVE-2023-52744, CVE-2023-52747, CVE-2023-52749, CVE-2023-52750, CVE-2023-52751, CVE-2023-52752, CVE-2023-52756, CVE-2023-52757, CVE-2023-52758, CVE-2023-52759, CVE-2023-52760, CVE-2023-52762, CVE-2023-52771, CVE-2023-52775, CVE-2023-52778, CVE-2023-52782, CVE-2023-52784, CVE-2023-52786, CVE-2023-52787, CVE-2023-52788, CVE-2023-52791, CVE-2023-52792, CVE-2023-52794, CVE-2023-52795, CVE-2023-52796, CVE-2023-52798, CVE-2023-52800, CVE-2023-52801, CVE-2023-52803, CVE-2023-52806, CVE-2023-52808, CVE-2023-52811, CVE-2023-52813, CVE-2023-52814, CVE-2023-52815, CVE-2023-52817, CVE-2023-52818, CVE-2023-52819, CVE-2023-52828, CVE-2023-52831, CVE-2023-52832, CVE-2023-52833, CVE-2023-52834, CVE-2023-52835, CVE-2023-52837, CVE-2023-52840, CVE-2023-52842, CVE-2023-52845, CVE-2023-52846, CVE-2023-52849, CVE-2023-52851, CVE-2023-52854, CVE-2023-52859, CVE-2023-52864, CVE-2023-52866, CVE-2023-52867, CVE-2023-52869, CVE-2023-52872, CVE-2023-52878, CVE-2023-52880, CVE-2023-52881, CVE-2023-52882, CVE-2023-52883, CVE-2023-52884, CVE-2023-52885, CVE-2023-52886, CVE-2023-52898, CVE-2023-52901, CVE-2023-52902, CVE-2023-52905, CVE-2023-52906, CVE-2023-52908, CVE-2023-52909, CVE-2023-52910, CVE-2023-52912, CVE-2023-52917, CVE-2023-52920, CVE-2023-52921, CVE-2023-52922

CVE-2022-0171, CVE-2022-0213, CVE-2022-0351, CVE-2022-0500, CVE-2022-1056, CVE-2022-1247, CVE-2022-1292, CVE-2022-1616, CVE-2022-1619, CVE-2022-1620, CVE-2022-1674, CVE-2022-1720, CVE-2022-1725, CVE-2022-1972, CVE-2022-1974, CVE-2022-2042, CVE-2022-2068, CVE-2022-2097, CVE-2022-2124, CVE-2022-2125, CVE-2022-2126, CVE-2022-2129, CVE-2022-2175, CVE-2022-2182, CVE-2022-2183, CVE-2022-2206, CVE-2022-2207, CVE-2022-2208, CVE-2022-2210, CVE-2022-2257, CVE-2022-2284, CVE-2022-2285, CVE-2022-2286, CVE-2022-2287, CVE-2022-2304, CVE-2022-2343, CVE-2022-2344, CVE-2022-2345, CVE-2022-2522, CVE-2022-2785, CVE-2022-2817, CVE-2022-2819, CVE-2022-2845, CVE-2022-2849, CVE-2022-2862, CVE-2022-2874, CVE-2022-2889, CVE-2022-2905, CVE-2022-2923, CVE-2022-2946, CVE-2022-2980, CVE-2022-2982, CVE-2022-3016, CVE-2022-3037, CVE-2022-3099, CVE-2022-3134, CVE-2022-3153, CVE-2022-3234, CVE-2022-3235, CVE-2022-3256, CVE-2022-3278, CVE-2022-3296, CVE-2022-3297, CVE-2022-3324, CVE-2022-3344, CVE-2022-3352, CVE-2022-3424, CVE-2022-3534, CVE-2022-3542, CVE-2022-3554, CVE-2022-3555, CVE-2022-3606, CVE-2022-3629, CVE-2022-3633, CVE-2022-3705,CVE-2022-3857, CVE-2022-3903, CVE-2022-4141, CVE-2022-4292, CVE-2022-4293, CVE-2022-4304, CVE-2022-4450, CVE-2022-4543, CVE-2022-20153, CVE-2022-20154, CVE-2022-22822, CVE-2022-22823, CVE-2022-22824, CVE-2022-22825, CVE-2022-22826, CVE-2022-22827, CVE-2022-23222, CVE-2022-24959, CVE-2022-25265, CVE-2022-26878, CVE-2022-26966, CVE-2022-27672, CVE-2022-36313, CVE-2022-37050, CVE-2022-37051, CVE-2022-37052, CVE-2022-38533, CVE-2022-40896, CVE-2022-41741, CVE-2022-41742, CVE-2022-44840, CVE-2022-47007, CVE-2022-47008, CVE-2022-47010, CVE-2022-47011, CVE-2022-48628, CVE-2022-48632, CVE-2022-48635, CVE-2022-48637, CVE-2022-48638, CVE-2022-48639, CVE-2022-48640, CVE-2022-48641, CVE-2022-48643, CVE-2022-48644, CVE-2022-48652, CVE-2022-48653, CVE-2022-48657, CVE-2022-48658, CVE-2022-48660, CVE-2022-48662, CVE-2022-48669, CVE-2022-48672, CVE-2022-48673, CVE-2022-48675, CVE-2022-48689, CVE-2022-48690, CVE-2022-48691, CVE-2022-48694, CVE-2022-48696, CVE-2022-48697, CVE-2022-48701, CVE-2022-48702, CVE-2022-48703, CVE-2022-48704, CVE-2022-48705, CVE-2022-48706, CVE-2022-48707, CVE-2022-48709, CVE-2022-48710, CVE-2022-48712, CVE-2022-48713, CVE-2022-48714, CVE-2022-48719, CVE-2022-48720, CVE-2022-48721, CVE-2022-48724, CVE-2022-48725, CVE-2022-48727, CVE-2022-48728, CVE-2022-48729, CVE-2022-48731, CVE-2022-48732, CVE-2022-48736, CVE-2022-48737, CVE-2022-48741, CVE-2022-48744, CVE-2022-48745, CVE-2022-48746, CVE-2022-48748, CVE-2022-48751, CVE-2022-48752, CVE-2022-48754, CVE-2022-48757, CVE-2022-48760, CVE-2022-48761, CVE-2022-48763, CVE-2022-48764, CVE-2022-48767, CVE-2022-48768, CVE-2022-48769, CVE-2022-48770, CVE-2022-48773, CVE-2022-48778, CVE-2022-48780, CVE-2022-48781, CVE-2022-48783, CVE-2022-48784, CVE-2022-48785, CVE-2022-48786, CVE-2022-48787, CVE-2022-48793, CVE-2022-48796, CVE-2022-48797, CVE-2022-48799, CVE-2022-48800, CVE-2022-48801, CVE-2022-48802, CVE-2022-48804, CVE-2022-48806, CVE-2022-48809, CVE-2022-48810, CVE-2022-48811, CVE-2022-48812, CVE-2022-48813, CVE-2022-48814, CVE-2022-48815, CVE-2022-48816, CVE-2022-48817, CVE-2022-48818, CVE-2022-48819, CVE-2022-48823, CVE-2022-48825, CVE-2022-48830, CVE-2022-48831, CVE-2022-48832, CVE-2022-48834, CVE-2022-48835, CVE-2022-48836, CVE-2022-48837, CVE-2022-48839, CVE-2022-48840, CVE-2022-48843, CVE-2022-48844, CVE-2022-48848, CVE-2022-48849, CVE-2022-48850, CVE-2022-48853, CVE-2022-48858, CVE-2022-48861, CVE-2022-48862, CVE-2022-48863, CVE-2022-48864, CVE-2022-48865, CVE-2022-48866, CVE-2022-48875, CVE-2022-48876, CVE-2022-48879, CVE-2022-48883, CVE-2022-48884, CVE-2022-48885, CVE-2022-48886, CVE-2022-48887, CVE-2022-48889, CVE-2022-48890, CVE-2022-48896, CVE-2022-48899, CVE-2022-48900, CVE-2022-48913, CVE-2022-48914, CVE-2022-48915, CVE-2022-48921, CVE-2022-48929, CVE-2022-48931, CVE-2022-48934, CVE-2022-48938, CVE-2022-48939, CVE-2022-48943, CVE-2022-48944, CVE-2022-48946, CVE-2022-48950, CVE-2022-48951, CVE-2022-48953, CVE-2022-48961, CVE-2022-48963, CVE-2022-48968, CVE-2022-48969, CVE-2022-48971, CVE-2022-48972, CVE-2022-48974, CVE-2022-48975, CVE-2022-48978, CVE-2022-48979, CVE-2022-48981, CVE-2022-48982, CVE-2022-48983, CVE-2022-48984, CVE-2022-48985, CVE-2022-48986, CVE-2022-48987, CVE-2022-48988, CVE-2022-48989, CVE-2022-48990, CVE-2022-48991, CVE-2022-48994, CVE-2022-48997, CVE-2022-48999, CVE-2022-49005, CVE-2022-49006, CVE-2022-49011, CVE-2022-49012, CVE-2022-49013, CVE-2022-49014, CVE-2022-49015, CVE-2022-49017, CVE-2022-49021, CVE-2022-49022, CVE-2022-49024, CVE-2022-49027, CVE-2022-49028,CVE-2022-49029

CVE-2021-3572, CVE-2021-3714,CVE-2021-3782, CVE-2021-3826, CVE-2021-3903, CVE-2021-3927, CVE-2021-3928, CVE-2021-3968, CVE-2021-3973, CVE-2021-3974, CVE-2021-4135, CVE-2021-4136, CVE-2021-4166, CVE-2021-4173, CVE-2021-4187, CVE-2021-4202, CVE-2021-4204, CVE-2021-20197, CVE-2021-20320, CVE-2021-23336, CVE-2021-25317, CVE-2021-27290, CVE-2021-28711, CVE-2021-28712, CVE-2021-28713, CVE-2021-31535, CVE-2021-32815, CVE-2021-33656, CVE-2021-34334, CVE-2021-34335, CVE-2021-34693, CVE-2021-34866, CVE-2021-36217, CVE-2021-37159, CVE-2021-37615, CVE-2021-37616, CVE-2021-37620, CVE-2021-37621, CVE-2021-37622, CVE-2021-37623, CVE-2021-42739, CVE-2021-43975, CVE-2021-45078, CVE-2021-45402, CVE-2021-45940, CVE-2021-45941, CVE-2021-46904, CVE-2021-46909, CVE-2021-46910, CVE-2021-46917, CVE-2021-46918, CVE-2021-46919, CVE-2021-46920, CVE-2021-46923, CVE-2021-46931, CVE-2021-46932, CVE-2021-46937, CVE-2021-46999, CVE-2021-47014, CVE-2021-47017, CVE-2021-47020, CVE-2021-47033, CVE-2021-47041, CVE-2021-47070, CVE-2021-47071, CVE-2021-47073, CVE-2021-47074, CVE-2021-47075, CVE-2021-47079, CVE-2021-47089, CVE-2021-47092, CVE-2021-47097, CVE-2021-47098, CVE-2021-47101, CVE-2021-47103, CVE-2021-47182, CVE-2021-47185, CVE-2021-47191, CVE-2021-47196, CVE-2021-47197, CVE-2021-47199, CVE-2021-47202, CVE-2021-47210, CVE-2021-47214, CVE-2021-47215, CVE-2021-47217, CVE-2021-47222, CVE-2021-47223, CVE-2021-47226, CVE-2021-47227, CVE-2021-47230, CVE-2021-47236, CVE-2021-47237, CVE-2021-47238, CVE-2021-47239, CVE-2021-47241, CVE-2021-47250, CVE-2021-47251, CVE-2021-47257, CVE-2021-47261, CVE-2021-47266, CVE-2021-47272, CVE-2021-47275, CVE-2021-47287, CVE-2021-47290, CVE-2021-47308, CVE-2021-47313, CVE-2021-47316, CVE-2021-47317, CVE-2021-47318, CVE-2021-47325, CVE-2021-47327, CVE-2021-47343, CVE-2021-47346, CVE-2021-47349, CVE-2021-47352, CVE-2021-47360, CVE-2021-47365, CVE-2021-47373, CVE-2021-47378, CVE-2021-47380, CVE-2021-47383, CVE-2021-47384, CVE-2021-47385, CVE-2021-47386, CVE-2021-47393, CVE-2021-47398, CVE-2021-47404, CVE-2021-47420, CVE-2021-47422, CVE-2021-47426, CVE-2021-47428, CVE-2021-47429, CVE-2021-47430, CVE-2021-47432, CVE-2021-47438, CVE-2021-47441, CVE-2021-47444, CVE-2021-47449, CVE-2021-47454, CVE-2021-47455, CVE-2021-47457, CVE-2021-47465, CVE-2021-47481, CVE-2021-47483, CVE-2021-47488, CVE-2021-47490, CVE-2021-47495, CVE-2021-47497, CVE-2021-47499, CVE-2021-47500, CVE-2021-47504, CVE-2021-47505, CVE-2021-47516, CVE-2021-47517, CVE-2021-47519, CVE-2021-47527, CVE-2021-47536, CVE-2021-47537, CVE-2021-47538, CVE-2021-47539, CVE-2021-47550, CVE-2021-47558, CVE-2021-47559, CVE-2021-47561, CVE-2021-47572, CVE-2021-47576, CVE-2021-47578, CVE-2021-47579, CVE-2021-47582, CVE-2021-47601, CVE-2021-47607, CVE-2021-47609, CVE-2021-47613, CVE-2021-47615, CVE-2021-47616, CVE-2021-47617, CVE-2021-47620, CVE-2021-47622,CVE-2021-47623

CVE-2020-10135, CVE-2020-12413, CVE-2020-13844, CVE-2020-14304, CVE-2020-18771, CVE-2020-23922, CVE-2020-26140, CVE-2020-26144, CVE-2020-26146, CVE-2020-35501, CVE-2020-36023, CVE-2020-36386, CVE-2020-36558, CVE-2020-36781, CVE-2020-36782

CVE-2019-16089, CVE-2019-16163, CVE-2019-25162

CVE-2018-13419

CVE-2017-6519, CVE-2017-16232, CVE-2017-17973, CVE-2017-1000383

CVE-2016-1247, CVE-2016-20012

CVE-2005-0602, CVE-2005-2541

CVE-2001-1268, CVE-2001-1269

Deprecated features
The following features were deprecated in this release:
Deprecated foundation models
The following models are now deprecated and will be withdrawn in a future release:
  • granite-13b-chat-v2
  • granite-20b-multilingual
  • codellama-34b-instruct-hf
  • llama-3-1-8b-instruct
  • llama-3-1-70b-instruct

For details, see Foundation model lifecycle.

IBM Software Hub Version 5.1.0

A new version of watsonx.ai was released in December 2024 with IBM Software Hub 5.1.0.

Operand version: 10.0.0

This release includes the following changes:

New features
This release of watsonx.ai includes the following features:
Install watsonx.ai on a single node OpenShift® (SNO) cluster
You can now install watsonx.ai in the full service or lightweight engine mode on a single node OpenShift (SNO) cluster if high availability and scalability is not a requirement. For details, see IBM Software Hub platform hardware requirements and Choosing an installation mode in IBM watsonx.ai.
New software specification for deploying custom foundation models
You can now deploy custom foundation models by using the new watsonx-cfm-caikit-1.1 software specification. This software specification is not available with every model architecture.
New model architectures for deploying custom foundation models
You can now deploy custom foundation models from the following model architectures with the vLLM runtime:
  • Bloom
  • Databricks
  • exaone
  • Falcon
  • GPTJ
  • Gemma
  • Gemma2
  • GPT_BigCode
  • GPT_Neox
  • GPTJ
  • GPT2
  • Granite
  • Jais
  • Llama
  • Marlin
  • Mistral
  • Mixtral
  • MPT
  • Nemotron
  • Olmo
  • Persimmon
  • Phi
  • Phi3
  • Qwen2
Deploy custom foundation models on MIG-enabled clusters

You can now deploy custom foundation models on a cluster with Multi-Instance GPU (MIG) enablement. MIG is useful when you want to deploy an application that does not require the full power of an entire GPU.

Review hardware requirements and configure MIG support to deploy your custom foundation models. For more information, see Requirements for deploying custom foundation models on MIG-enabled clusters.

Deploy custom foundation models on specific GPU nodes
You can now deploy custom foundation models on specific GPU nodes when you have multiple GPU nodes available for deployment. Review the process of creating a customized hardware specification to use a specific GPU node for deploying your custom foundation model.
Automate the building of RAG patterns with AutoAI
Use AutoAI to automate the retrieval-augmented generation (RAG) process for a generative AI solution. Upload a collection of documents and transform them into vectors that can be used to improve the output from a large language model. Compare optimized pipelines to select the best RAG pattern for your application.
Screen capture of AutoAI RAG experiment summary
Simplify complex documents by using the text extraction API
Simplify your complex documents so that they can be processed by foundation models as part of a generative AI workflow. The text extraction API uses document understanding processing to extract text from document structures such as images, diagrams, and tables that foundation models often cannot interpret correctly.
Chat with multimodal foundation models about images
Add an image to your prompt and chat about the content of the image with a multimodal foundation model that supports image-to-text tasks. You can chat about images from the Prompt Lab in chat mode or by using the Chat API.
Build conversational workflows with the watsonx.ai chat API
Use the watsonx.ai chat API to add generative AI capabilities, including agent-driven calls to third-party tools and services, into your applications.
Add contextual information to foundation model prompts in Prompt Lab
Help a foundation model generate factual and up-to-date answers in RAG use cases by adding relevant contextual information to your prompt as grounding data. You can upload relevant documents or connect to a third-party vector store that has relevant data. When a new question is submitted, the question is used to query the grounding data for relevant facts. The top search results plus the original question are submitted as model input to help the foundation model incorporate relevant facts in its output.
Work with new foundation models in Prompt Lab
You can now use the following foundation models for inferencing from the API and from the Prompt Lab in watsonx.ai:
  • Granite Guardian 3.0 models in 2 billion and 8 billion parameter sizes
  • Granite Instruct 3.0 models in 2 billion and 8 billion parameter sizes
  • granite-20b-code-base-sql-gen
  • granite-20b-code-base-schema-linking
  • codestral-22b
  • Llama 3.2 Instruct models in 1 billion and 3 billion parameter sizes
  • Llama 3.2 Vision Instruct models in 11 billion and 90 billion parameter sizes
  • llama-guard-3-11b-vision
  • mistral-small
  • ministral-8b
  • pixtral-12b

For details, see Foundation models in watsonx.ai.

Work with new embedding models for text matching and retrieval tasks
You can now use the following embedding models to vectorize text in watsonx.ai:
  • all-minilm-l12-v2

For details, see Foundation models in watsonx.ai.

Enhance search and retrieval tasks with the text rerank API
Use the text rerank method in the watsonx.ai REST API together with the ms-marco-minilm-l-12-v2 reranker model to reorder a set of document passages based on their similarity to a specified query. Reranking adds precision to your answer retrieval workflows.

For details about the ms-marco-minilm-l-12-v2 model, see Foundation models in watsonx.ai.

Review benchmarks that show how foundation models perform on common tasks

Review foundation model benchmarks to learn about the capabilities of foundation models deployed in watsonx.ai before you try them out. Compare how various foundation models perform on the tasks that matter most for your use case.

Configure AI guardrails for user input and foundation model output separately in Prompt Lab
Adjust the sensitivity of the AI guardrails that find and remove harmful content when you experiment with foundation model prompts in Prompt Lab. You can set different filter sensitivity levels for user input and model output text, and you can save effective AI guardrails settings in prompt templates.

To read more about these features, see What's new and changed in watsonx.ai in the IBM watsonx documentation.

Updates
The following updates were introduced in this release:
New version of the granite-3b-code-instruct foundation model
The granite-3b-code-instruct foundation model is updated to version 2.0.0. The latest modification can handle larger prompts. The context window length (input + output) for prompts increased from 8,192 to 128,000.
Issues fixed in this release
The following issues were fixed in this release:
Prompt template or prompt session loses the associated custom foundation model after an upgrade
  • Issue: After you upgrade the software, when you open a prompt template or prompt session asset for a custom foundation model that was saved in an earlier software version, the foundation model field is empty. The Model field shows No model selected.
  • Resolution: A prompt template asset saved in an earlier software version retains the associated custom foundation model after an upgrade.
Cannot preview chat and freeform prompt templates that are saved to a catalog
  • Issue: When you save a prompt template that was created in the Prompt Lab in structured mode, and then add the prompt template to a catalog, you can preview the prompt template asset from the Assets page of the catalog. However, when you try to preview a prompt template asset that was created in chat or freeform mode, a blank page is displayed.
  • Resolution: You can preview prompt templates that are created in chat and freeform modes and saved to a catalog.
Customer-reported issues fixed in this release
For a list of customer-reported issues that were fixed in this release, see the Fix List for IBM Cloud Pak for Data on the IBM Support website.
Security issues fixed in this release
The following security issues were fixed in this release:

CVE-2024-2398, CVE-2024-4067, CVE-2024-4558, CVE-2024-6119, CVE-2024-6501, CVE-2024-6923, CVE-2024-7006, CVE-2024-7042, CVE-2024-7774, CVE-2024-8768, CVE-2024-8775, CVE-2024-9341, CVE-2024-9902, CVE-2024-21208, CVE-2024-21210, CVE-2024-21217, CVE-2024-21235, CVE-2024-23222, CVE-2024-23271, CVE-2024-27808, CVE-2024-27820, CVE-2024-27833, CVE-2024-27838, CVE-2024-27851, CVE-2024-30203, CVE-2024-30204, CVE-2024-30205, CVE-2024-34397, CVE-2024-37370, CVE-2024-37371, CVE-2024-37891, CVE-2024-39331, CVE-2024-40776, CVE-2024-40779, CVE-2024-40780, CVE-2024-40782, CVE-2024-40789, CVE-2024-40866, CVE-2024-42367, CVE-2024-43796, CVE-2024-43799, CVE-2024-44187, CVE-2024-45296, CVE-2024-45490, CVE-2024-45492, CVE-2024-45590, CVE-2024-47175, CVE-2024-47554, CVE-2024-47764, CVE-2024-47874, CVE-2024-48948, CVE-2024-49766, CVE-2024-49767

CVE-2023-5752, CVE-2023-37920, CVE-2023-38552, CVE-2023-40397, CVE-2023-42843, CVE-2023-42852, CVE-2023-42917, CVE-2023-42950, CVE-2023-42956, CVE-2023-45143

CVE-2022-32885

Deprecated features
The following features were deprecated in this release:
Deprecated foundation models
The following models are now deprecated and will be withdrawn in a future release:
  • granite-7b-lab
  • llama2-13b-dpo-v7
  • llama-3-8b-instruct
  • llama-3-70b-instruct
  • mt0-xxl-13b
Withdrawn foundation models
The following models are now withdrawn from the watsonx.ai service:
  • llama-2-70b-chat
  • merlinite-7b

For details, see Foundation model lifecycle.