# Hotfixes for Version 2.21

This section provides details on all hotfixes available for version 2.21. Hotfixes are critical updates released between our major and minor versions to address specific issues or vulnerabilities. These updates ensure the system remains secure, stable, and optimized without requiring a full version upgrade.

<table><thead><tr><th width="116.40625">Version</th><th width="129.984375">Date (MM/DD/YYYY)</th><th width="116.72265625">Internal ID</th><th width="394.51953125">Description</th></tr></thead><tbody><tr><td>2.21.69</td><td>03/31/2026</td><td>RUN-36598</td><td>Fixed an issue where department data was not synced to the cluster, affecting both department creation and updates.</td></tr><tr><td>2.21.69</td><td>03/31/2026</td><td>RUN-36493</td><td>Fixed a security vulnerability related to GHSA-43fc-jf86-j433 with severity HIGH.</td></tr><tr><td>2.21.69</td><td>03/31/2026</td><td>RUN-36443</td><td>Fixed an issue where the dashboard returned a 500 error instead of an informative error message.</td></tr><tr><td>2.21.69</td><td>03/31/2026</td><td>RUN-36456</td><td>Fixed an issue where enabling <code>spec.global.enableWorkloadOwnershipProtection</code> prevented the Workload Overseer from enforcing project scheduling rules such as Idle GPU timeout and Workload Duration limits.</td></tr><tr><td>2.21.69</td><td>03/31/2026</td><td>RUN-35612</td><td>Fixed a security vulnerability related to CVE-2025-64756 with severity HIGH.</td></tr><tr><td>2.21.69</td><td>03/31/2026</td><td>RUN-36664</td><td>Fixed a security vulnerability related to GHSA-pwhc-rpq9-4c8w with severity HIGH.</td></tr><tr><td>2.21.69</td><td>03/31/2026</td><td>RUN-36732</td><td>Fixed a security vulnerability related to GHSA-5vv4-hvf7-2h46 with severity HIGH.</td></tr><tr><td>2.21.69</td><td>03/31/2026</td><td>RUN-37167</td><td>Fixed a security vulnerability related to GHSA-72hv-8253-57qq with severity HIGH.</td></tr><tr><td>2.21.69</td><td>03/31/2026</td><td>RUN-37169</td><td>Fixed a security vulnerability related to GHSA-5rq4-664w-9x2c with severity HIGH.</td></tr><tr><td>2.21.69</td><td>03/31/2026</td><td>RUN-37170</td><td>Fixed a security vulnerability related to GHSA-23c5-xmqv-rm74 with severity HIGH.</td></tr><tr><td>2.21.69</td><td>03/31/2026</td><td>RUN-37278</td><td>Fixed a security vulnerability related to CVE-2024-1013 with severity HIGH.</td></tr><tr><td>2.21.69</td><td>03/31/2026</td><td>RUN-37372</td><td>Fixed a security vulnerability related to CVE-2025-61731 with severity HIGH.</td></tr><tr><td>2.21.69</td><td>03/31/2026</td><td>RUN-37497</td><td>Fixed a security vulnerability related to CVE-2026-27142 with severity HIGH.</td></tr><tr><td>2.21.69</td><td>03/31/2026</td><td>RUN-37504</td><td>Fixed a security vulnerability related to CVE-2026-25679 with severity HIGH.</td></tr><tr><td>2.21.69</td><td>03/31/2026</td><td>RUN-37578</td><td>Fixed a security vulnerability related to GHSA-25h7-pfq9-p65f with severity HIGH.</td></tr><tr><td>2.21.69</td><td>03/31/2026</td><td>RUN-37698</td><td>Fixed a security vulnerability related to GHSA-p77j-4mvh-x3m3 with severity HIGH.</td></tr><tr><td>2.21.66</td><td>02/15/2026</td><td>RUN-36555</td><td>Fixed a security vulnerability related to CVE-2024-56171 with severity HIGH.</td></tr><tr><td>2.21.65</td><td>02/12/2026</td><td>RUN-36381</td><td>Fixed a security vulnerability related to GHSA-jmp9-x22r-554x with severity HIGH.</td></tr><tr><td>2.21.65</td><td>02/12/2026</td><td>RUN-36406</td><td>Fixed a security vulnerability related to GHSA-pwhc-rpq9-4c8w with severity HIGH.</td></tr><tr><td>2.21.65</td><td>02/12/2026</td><td>RUN-36413</td><td>Fixed a security vulnerability related to CVE-2024-41110 with severity HIGH.</td></tr><tr><td>2.21.65</td><td>02/12/2026</td><td>RUN-36457</td><td>Fixed an issue where, on rare occasions, "Allocation ratio by node pool" widget would show incorrect data.</td></tr><tr><td>2.21.63</td><td>02/03/2026</td><td>RUN-35326</td><td>Fixed an issue where the Projects/Departments table in the Overview dashboard sometimes showed fewer than 15 projects/departments when their workloads did not have allocated GPUs or were not in Running or Pending status.</td></tr><tr><td>2.21.63</td><td>02/03/2026</td><td>RUN-35443</td><td>Fixed a security vulnerability related to CVE-2025-68973 with severity HIGH.</td></tr><tr><td>2.21.63</td><td>02/03/2026</td><td>RUN-35922</td><td>Fixed a security vulnerability related to CVE-2026-0861 with severity HIGH.</td></tr><tr><td>2.21.62</td><td>01/27/2026</td><td>RUN-35976</td><td>Fixed an issue where workloads submitted with names longer than 63 characters failed to schedule.</td></tr><tr><td>2.21.62</td><td>01/27/2026</td><td>RUN-33806</td><td>Fixed an issue where containers ran as root instead of a non-privileged user.</td></tr><tr><td>2.21.62</td><td>01/27/2026</td><td>RUN-32181</td><td>Fixed a security vulnerability related to CVE-2025-32988 with severity HIGH.</td></tr><tr><td>2.21.62</td><td>01/27/2026</td><td>RUN-34720</td><td>Fixed a security vulnerability related to CVE-2025-65637 with severity HIGH.</td></tr><tr><td>2.21.62</td><td>01/27/2026</td><td>RUN-34721</td><td>Fixed a security vulnerability related to CVE-2024-25621 with severity HIGH.</td></tr><tr><td>2.21.62</td><td>01/27/2026</td><td>RUN-35421</td><td>Fixed a security vulnerability related to CVE-2025-15284 with severity HIGH.</td></tr><tr><td>2.21.62</td><td>01/27/2026</td><td>RUN-35443</td><td>Fixed a security vulnerability related to CVE-2025-68973 with severity HIGH.</td></tr><tr><td>2.21.62</td><td>01/27/2026</td><td>RUN-35511</td><td>Fixed an issue where an incorrect FQDN used during certificate generation caused errors.</td></tr><tr><td>2.21.60</td><td>01/13/2026</td><td>RUN-34858</td><td>Fixed a security vulnerability related to CVE-2024-25621 with severity HIGH.</td></tr><tr><td>2.21.60</td><td>01/13/2026</td><td>RUN-35089</td><td>Fixed a security vulnerability related to CVE-2025-64756 with severity HIGH.</td></tr><tr><td>2.21.59</td><td>01/05/2026</td><td>RUN-31856</td><td>Fixed a security vulnerability related to CVE-2025-47907 with severity HIGH.</td></tr><tr><td>2.21.59</td><td>01/05/2026</td><td>RUN-33780</td><td>Fixed an issue where apps with the “Viewer” role could not access node metrics, even when they had read permissions at the cluster scope.</td></tr><tr><td>2.21.59</td><td>01/05/2026</td><td>RUN-33862</td><td>Fixed an issue where the workloads service could enter a CrashLoopBackOff during upgrade.</td></tr><tr><td>2.21.59</td><td>01/05/2026</td><td>RUN-34678</td><td>Fixed a security vulnerability related to CVE-2025-58183 with severity HIGH.</td></tr><tr><td>2.21.59</td><td>01/05/2026</td><td>RUN-34712</td><td>Fixed a security vulnerability related to CVE-2025-61729 with severity HIGH.</td></tr><tr><td>2.21.59</td><td>01/05/2026</td><td>RUN-34932</td><td>Fixed a security vulnerability related to CVE-2025-58754 with severity HIGH.</td></tr><tr><td>2.21.57</td><td>11/20/2025</td><td>RUN-33802</td><td>Fixed an issue that caused distributed inference workloads to become unsynchronized.</td></tr><tr><td>2.21.57</td><td>11/20/2025</td><td>RUN-33144</td><td>Fixed a security vulnerability related to CVE-2025-62156 with severity HIGH.</td></tr><tr><td>2.21.56</td><td>11/20/2025</td><td>RUN-33613</td><td>Fixed missing validations for CPU resources when the CPU quota feature flag was disabled, which caused project and department updates to skip required CPU checks.</td></tr><tr><td>2.21.56</td><td>11/20/2025</td><td>RUN-33947</td><td>Fixed an issue where SMTP configurations using the “none” option still sent empty username/password fields. Added the <code>auth_none</code> type to ensure no credentials are sent for passwordless SMTP servers.</td></tr><tr><td>2.21.55</td><td>11/13/2025</td><td>RUN-33840</td><td>Fixed a revision sync issue that caused excessive error logs</td></tr><tr><td>2.21.53</td><td>11/02/2024</td><td>RUN-33053</td><td>Fixed an issue that caused conflicts with additional built-in Prometheus Operator deployments in OpenShift.</td></tr><tr><td>2.21.53</td><td>11/02/2024</td><td>RUN-33006</td><td>Fixed an issue in the CLI installer where the PATH was not configured for all shells. The installer now correctly configures PATH for both zsh and bash.</td></tr><tr><td>2.21.53</td><td>11/02/2024</td><td>RUN-32945</td><td>Fixed a security vulnerability related to CVE-2025-58754 with severity HIGH.</td></tr><tr><td>2.21.53</td><td>11/02/2024</td><td>RUN-32548</td><td>Fixed an issue where, in certain edge cases, removing an inference workload without deleting its revision caused the cluster to panic during revision sync.</td></tr><tr><td>2.21.52</td><td>10/19/2025</td><td>RUN-31803</td><td>Fixed an issue where the Quota management dashboard occasionally displayed incorrect GPU quota values.</td></tr><tr><td>2.21.52</td><td>10/19/2025</td><td>RUN-33044</td><td>Fixed an issue where the workload controller could delete all running workloads when <code>init-ca</code> generated a new certificate (every 30 days).</td></tr><tr><td>2.21.51</td><td>10/16/2025</td><td>RUN-31383</td><td>Fixed a security vulnerability related to CVE-2025-7783 with severity HIGH.</td></tr><tr><td>2.21.51</td><td>10/16/2025</td><td>RUN-31422</td><td>Fixed an issue where updating project resources created through the deprecated Projects API did not work correctly.</td></tr><tr><td>2.21.51</td><td>10/16/2025</td><td>RUN-31571</td><td>Fixed a security vulnerability related to CVE-2025-6965 with severity HIGH.</td></tr><tr><td>2.21.51</td><td>10/16/2025</td><td>RUN-31792</td><td>Fixed a security vulnerability related to CVE-2025-7425 with severity HIGH.</td></tr><tr><td>2.21.51</td><td>10/16/2025</td><td>RUN-31855</td><td>Fixed a security vulnerability related to CVE-2025-47907 with severity HIGH.</td></tr><tr><td>2.21.51</td><td>10/16/2025</td><td>RUN-31993</td><td>Fixed a security vulnerability related to CVE-2025-22868 with severity HIGH.</td></tr><tr><td>2.21.51</td><td>10/16/2025</td><td>RUN-32146</td><td>Fixed a security vulnerability related to CVE-2025-5914 with severity HIGH.</td></tr><tr><td>2.21.51</td><td>10/16/2025</td><td>RUN-32572</td><td>Fixed an issue where the <code>RunaiAgentPullRateLow</code> and <code>RunaiAgentClusterInfoPushRateLow</code> Prometheus alerts were firing incorrectly without cause.</td></tr><tr><td>2.21.51</td><td>10/16/2025</td><td>RUN-32730</td><td>Fixed an issue where incorrect average GPU utilization per project and workload type was displayed in the Projects view charts and tables.</td></tr><tr><td>2.21.51</td><td>10/16/2025</td><td>RUN-32789</td><td>Fixed an issue in CLI v2 where the <code>--master-extended-resource</code> flag had no effect in MPI training workloads.</td></tr><tr><td>2.21.51</td><td>10/16/2025</td><td>RUN-32889</td><td>Fixed an issue where idle GPU timeout rules were incorrectly applied to preemptible workspaces.</td></tr><tr><td>2.21.51</td><td>10/16/2025</td><td>RUN-33039</td><td>Fixed an issue where setting <code>uid</code> or <code>gid</code> to <code>0</code> during environment creation was not allowed.</td></tr><tr><td>2.21.46</td><td>08/12/2025</td><td>RUN-28394</td><td>Fixed an issue where using the GET Roles API returned a 403 unauthorized for all users.</td></tr><tr><td>2.21.46</td><td>08/12/2025</td><td>RUN-31008</td><td>Fixed a security vulnerability related to CVE-2025-53547 with severity HIGH.</td></tr><tr><td>2.21.46</td><td>08/12/2025</td><td>RUN-31051</td><td>Fixed a security vulnerability related to CVE-2025-49794 with severity HIGH.</td></tr><tr><td>2.21.46</td><td>08/12/2025</td><td>RUN-31310</td><td>Fixed a security vulnerability related to CVE-2025-22868 with severity HIGH.</td></tr><tr><td>2.21.46</td><td>08/12/2025</td><td>RUN-31678</td><td>Fixed an issue where the workload flexible submission form did not load the correct default node pools for a project.</td></tr><tr><td>2.21.45</td><td>08/01/2025</td><td>RUN-31265</td><td>Fixed a security vulnerability related to CVE-2025-30749 with severity HIGH.</td></tr><tr><td>2.21.45</td><td>08/01/2025</td><td>RUN-31007</td><td>Fixed a security vulnerability related to CVE-2025-22874 with severity HIGH.</td></tr><tr><td>2.21.43</td><td>07/30/2025</td><td>RUN-29828</td><td>Fixed an issue where the completion time date formatting in the Workload grid was inconsistent. Also resolved a bug where exported CSV files shifted date values to the next cell.</td></tr><tr><td>2.21.43</td><td>07/30/2025</td><td>RUN-31039</td><td>Fixed a base image security vulnerability in <code>libxml2</code> related to CVE-2025-49796 with severity HIGH.</td></tr><tr><td>2.21.43</td><td>07/30/2025</td><td>RUN-31263</td><td>Fixed an issue where setting defaults for servingPort fields failed and incorrectly required the container port default as well.</td></tr><tr><td>2.21.42</td><td>07/24/2025</td><td>RUN-30746</td><td>Fixed an issue where workloads could not be scheduled if the combined length of the project name and node pool name was excessively long.</td></tr><tr><td>2.21.42</td><td>07/24/2025</td><td>RUN-31039</td><td>Fixed a security vulnerability in <code>golang.org/x/oauth2</code> related to CVE-2025-22868 with severity HIGH.</td></tr><tr><td>2.21.42</td><td>07/24/2025</td><td>RUN-31358</td><td>Fixed an issue where enabling <code>enableWorkloadOwnershipProtection</code> for inference workloads caused newly submitted workloads to get stuck.</td></tr><tr><td>2.21.41</td><td>07/20/2025</td><td>RUN-31131</td><td>Fixed a security vulnerability in <code>runai-container-runtime-installer</code> and <code>runai-container-toolkit</code> related to CVE-2025-49794 with severity HIGH.</td></tr><tr><td>2.21.39</td><td>07/17/2025</td><td>RUN-29092</td><td>Fixed an issue where project quota could not be changed due to scheduling rules being set to 0 instead of null.</td></tr><tr><td>2.21.38</td><td>07/14/2025</td><td>RUN-28377</td><td>Fixed an issue where the CLI cache folder was created in a location where the user might not have sufficient permissions, leading to failures. The cache folder is now created in the same directory as the config file.</td></tr><tr><td>2.21.38</td><td>07/14/2025</td><td>RUN-30713</td><td>Fixed an issue where configuring an incorrect Auth URL during CLI installation could lead to connectivity issues. To prevent this, the option to set the Auth URL during installation has been removed. The install script now automatically sets the control plane URL based on the script's source.</td></tr><tr><td>2.21.37</td><td>07/09/2025</td><td>RUN-29113</td><td>Fixed a security vulnerability in <code>DOMPurify</code> related to CVE-2024-24762 with severity HIGH.</td></tr><tr><td>2.21.37</td><td>07/09/2025</td><td>RUN-30634</td><td>Fixed a security vulnerability in <code>cluster-installer</code> related to CVE-2025-30204 with severity HIGH.</td></tr><tr><td>2.21.37</td><td>07/09/2025</td><td>RUN-29831</td><td>Fixed an issue where the API documentation for asset filtering parameters was inaccurate.</td></tr><tr><td>2.21.37</td><td>07/09/2025</td><td>RUN-30673</td><td>Fixed an issue where users with create permissions on one scope and read-only permissions on another were incorrectly allowed to create projects in both scopes.</td></tr><tr><td>2.21.37</td><td>07/09/2025</td><td>RUN-30657</td><td>Fixed a security vulnerability in <code>runai-container-runtime-installer</code> and <code>runai-container-toolkit</code> related to CVE-2025-6020 with severity HIGH.</td></tr><tr><td>2.21.33</td><td>06/30/2025</td><td>RUN-30197</td><td>Fixed a security vulnerability in with <code>stdlib</code> package in <code>go</code> v1.24.2 related to CVE-2025-22874 with severity HIGH.</td></tr><tr><td>2.21.32</td><td>06/29/2025</td><td>RUN-30674</td><td>Fixed an issue where, on rare occasions, running the <code>runai upgrade</code> command deleted all files in the current directory.</td></tr><tr><td>2.21.30</td><td>06/29/2025</td><td>RUN-25883</td><td>Fixed a security vulnerability in <code>io.netty:netty-handler</code> related to CVE-2025-24970 with severity HIGH.</td></tr><tr><td>2.21.30</td><td>06/29/2025</td><td>RUN-30666</td><td>Fixed an issue where users were unable to create Hugging Face workloads due to a missing function in the system.</td></tr><tr><td>2.21.29</td><td>06/25/2025</td><td>RUN-27390</td><td>Fixed an issue where CPU-only workloads submitted via the CLI incorrectly displayed a GPU allocation value.</td></tr><tr><td>2.21.29</td><td>06/25/2025</td><td>RUN-29768</td><td>Fixed an issue where the Get token request returned a 500 error when the email mapper failed.</td></tr><tr><td>2.21.29</td><td>06/25/2025</td><td>RUN-29049</td><td>Fixed a security vulnerability in <code>github.com.golang.org.x.crypto</code> related to CVE-2025-22869 with severity HIGH.</td></tr><tr><td>2.21.28</td><td>06/25/2025</td><td>RUN-29143</td><td>Fixed an issue where nodes could become unschedulable when workloads were submitted to a different node pool.</td></tr><tr><td>2.21.27</td><td>06/17/2025</td><td>RUN-29709</td><td><ul><li>Fixed a security vulnerability in <code>jq cli</code> related to CVE-2024-53427 with severity HIGH.</li><li>Fixed a security vulnerability in <code>jq cli</code> related to CVE-2025-48060 with severity HIGH.</li></ul></td></tr><tr><td>2.21.27</td><td>06/17/2025</td><td>RUN-29756</td><td>Fixed an issue where not all subjects were returned for each project or department</td></tr><tr><td>2.21.27</td><td>06/17/2025</td><td>RUN-29700</td><td>Fixed a security vulnerability in <code>github.com/moby</code> and <code>github.com/docker/docker</code> related to CVE-2024-41110 with severity Critical.</td></tr><tr><td>2.21.25</td><td>06/11/2025</td><td>RUN-29548</td><td>Fixed a typo in the documentation where the API key was incorrectly written as enforceRun:aiScheduler instead of the correct enforceRunaiScheduler.</td></tr><tr><td>2.21.25</td><td>06/11/2025</td><td>RUN-29320</td><td>Fixed an issue in CLI v2 where the update server did not receive the terminal size during exec commands requiring TTY support. The terminal size is now set once upon session creation, ensuring proper behavior for interactive sessions.</td></tr><tr><td>2.21.24</td><td>06/08/2025</td><td>RUN-29282</td><td>Fixed a security vulnerability in <code>golang.org.x.crypto</code> related to CVE-2025-22869 with severity HIGH.</td></tr><tr><td>2.21.23</td><td>06/08/2025</td><td>RUN-28891</td><td><ul><li>Fixed a security vulnerability in <code>golang.org/x/crypto</code> related to CVE-2024-45337 with severity HIGH.</li><li>Fixed a security vulnerability in <code>go-git/go-git</code> related to CVE-2025-21613 with severity HIGH.</li></ul></td></tr><tr><td>2.21.23</td><td>06/08/2025</td><td>RUN-25281</td><td>Fixed an issue where deploying a Hugging Face model with vLLM using the Hugging Face inference UI form on an OpenShift environment failed due to permission errors.</td></tr><tr><td>2.21.22</td><td>06/03/2025</td><td>RUN-29341</td><td>Fixed an issue which caused high CPU usage in the Cluster API.</td></tr><tr><td>2.21.22</td><td>06/03/2025</td><td>RUN-29323</td><td>Fixed an issue where Prometheus failed to send metrics for OpenShift.</td></tr><tr><td>2.21.19</td><td>05/27/2025</td><td>RUN-29093</td><td>Fixed an issue where rotating the <code>runai-config</code> webhook secret caused the <code>app.kubernetes.io/managed-by=helm</code> label to be removed.</td></tr><tr><td>2.21.18</td><td>05/27/2025</td><td>RUN-28286</td><td>Fixed an issue where CPU-only workloads incorrectly triggered idle timeout notifications intended for GPU workloads.</td></tr><tr><td>2.21.18</td><td>05/27/2025</td><td>RUN-28555</td><td>Fixed an issue in Admin → General Settings where the "Disabled" workloads count displayed inconsistently between the collapsed and expanded views.</td></tr><tr><td>2.21.18</td><td>05/27/2025</td><td>RUN-26361</td><td>Fixed an issue where Prometheus remote-write credentials were not properly updated on OpenShift clusters.</td></tr><tr><td>2.21.18</td><td>05/27/2025</td><td>RUN-28780</td><td>Fixed an issue where Hugging Face model validation incorrectly blocked some valid models supported by vLLM and TGI.</td></tr><tr><td>2.21.18</td><td>05/27/2025</td><td>RUN-28851</td><td>Fixed an issue in CLI v2 where the <code>port-forward</code> command terminated SSH connections after 15–30 seconds due to an idle timeout.</td></tr><tr><td>2.21.18</td><td>05/27/2025</td><td>RUN-25281</td><td>Fixed an issue where the Hugging Face UI submission flow failed on OpenShift (OCP) clusters.</td></tr><tr><td>2.21.17</td><td>05/21/2025</td><td>RUN-28266</td><td>Fixed an issue where the documentation examples for the <code>runai workload delete</code> CLI command were incorrect.</td></tr><tr><td>2.21.17</td><td>05/21/2025</td><td>RUN-28609</td><td>Fixed an issue where users with the ML Engineer role were unable to delete multiple inference jobs at once.</td></tr><tr><td>2.21.17</td><td>05/21/2025</td><td>RUN-28665</td><td>Fixed an issue where using <code>servingPort</code> authorization fields in the Create an inference API on unsupported clusters did not return an error.</td></tr><tr><td>2.21.17</td><td>05/21/2025</td><td>RUN-28717</td><td>Fixed an issue where the Update inference spec API documentation listed an incorrect response code.</td></tr><tr><td>2.21.17</td><td>05/21/2025</td><td>RUN-28755</td><td>Fixed an issue where the tooltip next to the External URL for an inference endpoint incorrectly stated that the URL was internal.</td></tr><tr><td>2.21.17</td><td>05/21/2025</td><td>RUN-28762</td><td>Fixed an issue with the inference workload ownership protection.</td></tr><tr><td>2.21.17</td><td>05/21/2025</td><td>RUN-28859</td><td>Fixed an issue where the <code>knative.enable-scale-to-zero</code> setting did not default to true as expected.</td></tr><tr><td>2.21.17</td><td>05/21/2025</td><td>RUN-28923</td><td>Fixed an issue where calling the Get node telemetry data API with the telemetryType <code>IDLE_ALLOCATED_GPUS</code> resulted in a 500 Internal Server Error.</td></tr><tr><td>2.21.17</td><td>05/21/2025</td><td>RUN-28950</td><td>Fixed a security vulnerability in <code>github.com/moby</code> and <code>github.com/docker/docker</code> related to CVE-2024-41110 with severity Critical.</td></tr><tr><td>2.21.16</td><td>05/18/2025</td><td>RUN-27295</td><td>Fixed an issue in CLI v2 where the <code>--node-type</code> flag for inference workloads was not properly propagated to the pod specification.</td></tr><tr><td>2.21.16</td><td>05/18/2025</td><td>RUN-27375</td><td>Fixed an issue where projects were not visible in the legacy job submission form, preventing users from selecting a target project.</td></tr><tr><td>2.21.16</td><td>05/18/2025</td><td>RUN-27514</td><td>Fixed an issue where disabling CPU quota in the General settings did not remove existing CPU quotas from projects and departments.</td></tr><tr><td>2.21.16</td><td>05/18/2025</td><td>RUN-27521</td><td>Fixed a security vulnerability in <code>axios</code> related to CVE-2025-27152 with severity HIGH.</td></tr><tr><td>2.21.16</td><td>05/18/2025</td><td>RUN-27638</td><td>Fixed an issue where a node pool’s placement strategy stopped functioning correctly after being edited.</td></tr><tr><td>2.21.16</td><td>05/18/2025</td><td>RUN-27438</td><td>Fixed an issue where MPI jobs were unavailable due to an OpenShift MPI Operator installation error.</td></tr><tr><td>2.21.16</td><td>05/18/2025</td><td>RUN-27952</td><td>Fixed a security vulnerability in <code>emacs-filesystem</code> related to CVE-2025-1244 with severity HIGH.</td></tr><tr><td>2.21.16</td><td>05/18/2025</td><td>RUN-28244</td><td>Fixed a security vulnerability in <code>liblzma5</code> related to CVE-2025-31115 with severity HIGH.</td></tr><tr><td>2.21.16</td><td>05/18/2025</td><td>RUN-28006</td><td>Fixed an issue where tokens became invalid for the API server after one hour.</td></tr><tr><td>2.21.16</td><td>05/18/2025</td><td>RUN-28097</td><td>Fixed an issue where the <code>allocated_gpu_count_per_gpu</code> metric displayed incorrect data for fractional pods.</td></tr><tr><td>2.21.16</td><td>05/18/2025</td><td>RUN-28213</td><td>Fixed a security vulnerability in <code>github.com.golang.org.x.crypto</code> related to CVE-2025-22869 with severity HIGH.</td></tr><tr><td>2.21.16</td><td>05/18/2025</td><td>RUN-28311</td><td>Fixed an issue where user creation failed with a duplicate email error, even though the email address did not exist in the system.</td></tr><tr><td>2.21.16</td><td>05/18/2025</td><td>RUN-28832</td><td>Fixed inference CLI v2 documentation with examples that reflect correct usage.</td></tr><tr><td>2.21.15</td><td>04/30/2025</td><td>RUN-27533</td><td>Fixed an issue where workloads with idle GPUs were not suspended after exceeding the configured idle time.</td></tr><tr><td>2.21.14</td><td>04/29/2025</td><td>RUN-26608</td><td>Fixed an issue by adding a flag to the <code>cli config set</code> command and the CLI install script, allowing users to set a cache directory.</td></tr><tr><td>2.21.14</td><td>04/29/2025</td><td>RUN-27264</td><td>Fixed an issue where creating a project from the UI with a non-unlimited deserved CPU value caused the queue to be created with <code>limit = deserved</code> instead of unlimited.</td></tr><tr><td>2.21.14</td><td>04/29/2025</td><td>RUN-27484</td><td>Fixed an issue where duplicate <code>app.kubernetes.io/name labels</code> were applied to services in the control plane Helm chart.</td></tr><tr><td>2.21.14</td><td>04/29/2025</td><td>RUN-27502</td><td>Fixed the inference CLI commands documentation: <code>--max-replicas</code> and <code>--min-replicas</code> were incorrectly used instead of <code>--max-scale</code> and <code>--min-scale</code>.</td></tr><tr><td>2.21.14</td><td>04/29/2025</td><td>RUN-27513</td><td>Fixed an issue where cluster-scoped policies were not visible to users with appropriate permissions.</td></tr><tr><td>2.21.14</td><td>04/29/2025</td><td>RUN-27515</td><td>Fixed an issue where users were unable to use assets from an upper scope during flexible workload submissions.</td></tr><tr><td>2.21.14</td><td>04/29/2025</td><td>RUN-27520</td><td>Fixed an issue where adding access rules immediately after creating an application did not refresh the access rules table.</td></tr><tr><td>2.21.14</td><td>04/29/2025</td><td>RUN-27628</td><td>Fixed an issue where a node pool could remain stuck in Updating status in certain cases.</td></tr><tr><td>2.21.14</td><td>04/29/2025</td><td>RUN-27826</td><td>Fixed an issue where the <code>runai inference update</code> command could result in a failure to update the workload. Although the command itself succeeded (since the update is asynchronous), the update often failed, and the new spec was not applied.</td></tr><tr><td>2.21.14</td><td>04/29/2025</td><td>RUN-27915</td><td>Fixed an issue where the "Improved Command Line Interface" admin setting was incorrectly labeled as Beta instead of Stable.</td></tr><tr><td>2.21.11</td><td>04/29/2025</td><td>RUN-27251</td><td><ul><li>Fixed a security vulnerability in <code>github.com.golang-jwt.jwt.v4</code> and <code>github.com.golang-jwt.jwt.v5</code> with CVE-2025-30204 with severity HIGH.</li><li>Fixed a security vulnerability in <code>golang.org.x.net</code> with CVE-2025-22872 with severity MEDIUM.</li><li>Fixed a security vulnerability in <code>knative.dev/serving</code> with CVE-2023-48713 with severity MEDIUM.</li></ul></td></tr><tr><td>2.21.11</td><td>04/29/2025</td><td>RUN-27309</td><td>Fixed an issue where workloads configured with a multi node pool setup could fail to schedule on a specific node pool in the future after an initial scheduling failure, even if sufficient resources later became available.</td></tr><tr><td>2.21.10</td><td>04/29/2025</td><td>RUN-26992</td><td>Fixed an issue where workloads submitted with an invalid node port range would get stuck in Creating status.</td></tr><tr><td>2.21.10</td><td>04/29/2025</td><td>RUN-27497</td><td>Fixed an issue where, after deleting an SSO user and immediately creating a local user, the delete confirmation dialog reappeared unexpectedly.</td></tr><tr><td>2.21.9</td><td>04/15/2025</td><td>RUN-26989</td><td>Fixed an issue that prevented reordering node pools in the workload submission form.</td></tr><tr><td>2.21.9</td><td>04/15/2025</td><td>RUN-27247</td><td>Fixed security vulnerabilities in Spring framework used by <code>db-mechanic service</code> - CVE-2021-27568, CVE-2021-44228, CVE-2022-22965, CVE-2023-20873, CVE-2024-22243, CVE-2024-22259 and CVE-2024-22262.</td></tr><tr><td>2.21.9</td><td>04/15/2025</td><td>RUN-26359</td><td>Fixed an issue in CLI v2 where using the <code>--toleration</code> option required incorrect mandatory fields.</td></tr></tbody></table>


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://run-ai-docs.nvidia.com/self-hosted/2.21/getting-started/whats-new/hotfixes-version-2-21.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
