# Hotfixes for Version 2.24

This section provides details on all hotfixes available for version 2.24. Hotfixes are critical updates released between our major and minor versions to address specific issues or vulnerabilities. These updates ensure the system remains secure, stable, and optimized without requiring a full version upgrade.

<table><thead><tr><th width="113.9140625">Version</th><th width="130.42578125">Date (MM/DD/YYYY)</th><th width="118.6171875">Internal ID</th><th>Description</th></tr></thead><tbody><tr><td>2.24.75</td><td>04/30/2026</td><td>RUN-38467</td><td>Fixed a security vulnerability related to GHSA-pc3f-x583-g7j2 with severity HIGH.</td></tr><tr><td>2.24.75</td><td>04/30/2026</td><td>RUN-37894</td><td>Fixed a security vulnerability related to GHSA-xw7x-h9fj-p2c7 with severity CRITICAL.</td></tr><tr><td>2.24.75</td><td>04/30/2026</td><td>RUN-34648</td><td>Fixed an issue where an inference workload incorrectly displayed "Running" status when the pod was Pending after a scale-to-zero event.</td></tr><tr><td>2.24.74</td><td>04/27/2026</td><td>RUN-38510</td><td>Fixed a security vulnerability related to GHSA-9jj7-4m8r-rfcm with severity CRITICAL.</td></tr><tr><td>2.24.74</td><td>04/27/2026</td><td>RUN-38040</td><td>Fixed an issue where distributed workloads submitted with <code>hostNetwork: true</code> did not have <code>dnsPolicy</code> set to <code>ClusterFirstWithHostNet</code>.</td></tr><tr><td>2.24.73</td><td>04/27/2026</td><td>RUN-38569</td><td>Fixed an issue where users could not save project quota changes through the UI after upgrading to 2.24 when the over-quota priority feature was disabled.</td></tr><tr><td>2.24.73</td><td>04/27/2026</td><td>RUN-38503</td><td>Fixed a security vulnerability related to GHSA-rp42-5vxx-qpwr with severity HIGH.</td></tr><tr><td>2.24.73</td><td>04/27/2026</td><td>RUN-38474</td><td>Fixed a security vulnerability related to CVE-2026-27144 with severity HIGH.</td></tr><tr><td>2.24.73</td><td>04/27/2026</td><td>RUN-38430</td><td>Fixed an issue where workloads could not be submitted when the NVIDIA GPU Operator was deployed with the NRI plugin enabled.</td></tr><tr><td>2.24.73</td><td>04/27/2026</td><td>RUN-38428</td><td>Fixed a security vulnerability related to CVE-2026-40175 with severity CRITICAL.</td></tr><tr><td>2.24.73</td><td>04/27/2026</td><td>RUN-38405</td><td>Fixed an issue where uninstalling the cluster Helm chart on OpenShift failed because the runai-operator was missing permission to delete the <code>runai-prometheus</code> Secret in the <code>openshift-monitoring</code> namespace.</td></tr><tr><td>2.24.73</td><td>04/27/2026</td><td>RUN-38358</td><td>Fixed a security vulnerability related to CVE-2026-4424 with severity HIGH.</td></tr><tr><td>2.24.73</td><td>04/27/2026</td><td>RUN-38282</td><td>Fixed a security vulnerability related to CVE-2026-32283 with severity HIGH.</td></tr><tr><td>2.24.73</td><td>04/27/2026</td><td>RUN-38260</td><td>Fixed an issue where the Admin > Event history page returned a 500 error when filtering by Event ID.</td></tr><tr><td>2.24.73</td><td>04/27/2026</td><td>RUN-38240</td><td>Fixed a security vulnerability related to GHSA-6v2p-p543-phr9 with severity HIGH.</td></tr><tr><td>2.24.73</td><td>04/27/2026</td><td>RUN-38183</td><td>Fixed a security vulnerability related to CVE-2026-21710 with severity HIGH.</td></tr><tr><td>2.24.73</td><td>04/27/2026</td><td>RUN-38175</td><td>Fixed a security vulnerability related to CVE-2026-32280 with severity HIGH.</td></tr><tr><td>2.24.73</td><td>04/27/2026</td><td>RUN-38149</td><td>Fixed a security vulnerability related to CVE-2026-0994 with severity HIGH.</td></tr><tr><td>2.24.73</td><td>04/27/2026</td><td>RUN-38094</td><td>Fixed a security vulnerability related to CVE-2026-27654 with severity HIGH.</td></tr><tr><td>2.24.73</td><td>04/27/2026</td><td>RUN-38084</td><td>Fixed a security vulnerability related to GHSA-hfvc-g4fc-pqhx with severity HIGH.</td></tr><tr><td>2.24.73</td><td>04/27/2026</td><td>RUN-38072</td><td>Fixed an issue on OpenShift where duplicate ServiceMonitors caused PrometheusRuleFailures alerts.</td></tr><tr><td>2.24.73</td><td>04/27/2026</td><td>RUN-38058</td><td>Fixed an issue where inference requests exceeding 30 seconds returned a 502 Bad Gateway.</td></tr><tr><td>2.24.73</td><td>04/27/2026</td><td>RUN-38055</td><td>Fixed an issue where the access rules API accepted invalid <code>subjectType</code> values without returning a validation error.</td></tr><tr><td>2.24.73</td><td>04/27/2026</td><td>RUN-38029</td><td>Fixed an issue where the <code>GET /api/v1/workloads/pods</code> endpoint ignored project scope for user API tokens.</td></tr><tr><td>2.24.73</td><td>04/27/2026</td><td>RUN-37984</td><td>Fixed a security vulnerability related to GHSA-r5fr-rjxr-66jc with severity HIGH.</td></tr><tr><td>2.24.73</td><td>04/27/2026</td><td>RUN-37972</td><td>Fixed an issue where <code>ingressClass</code> was missing from the Minimal Cluster resource.</td></tr><tr><td>2.24.73</td><td>04/27/2026</td><td>RUN-37959</td><td>Fixed an issue where automatic topology constraints for distributed workloads were applied at the wrong topology level.</td></tr><tr><td>2.24.73</td><td>04/27/2026</td><td>RUN-37898</td><td>Fixed a security vulnerability related to GHSA-37ch-88jc-xwx2 with severity HIGH.</td></tr><tr><td>2.24.73</td><td>04/27/2026</td><td>RUN-37895</td><td>Fixed a security vulnerability related to GHSA-c2c7-rcm5-vvqj with severity HIGH.</td></tr><tr><td>2.24.73</td><td>04/27/2026</td><td>RUN-37701</td><td>Fixed a security vulnerability related to GHSA-p77j-4mvh-x3m3 with severity CRITICAL.</td></tr><tr><td>2.24.73</td><td>04/27/2026</td><td>RUN-37578</td><td>Fixed a security vulnerability related to GHSA-25h7-pfq9-p65f with severity HIGH.</td></tr><tr><td>2.24.73</td><td>04/27/2026</td><td>RUN-37532</td><td>Fixed an issue where workloads were slow to appear in the UI and API after being submitted.</td></tr><tr><td>2.24.73</td><td>04/27/2026</td><td>RUN-36615</td><td>Fixed a security vulnerability related to CVE-2024-12797 with severity HIGH.</td></tr><tr><td>2.24.73</td><td>04/27/2026</td><td>RUN-36456</td><td>Fixed an issue where enabling <code>enableWorkloadOwnershipProtection</code> prevented the Workload Overseer from enforcing project scheduling rules such as Idle GPU timeout and Workload Duration limits.</td></tr><tr><td>2.24.73</td><td>04/27/2026</td><td>RUN-35919</td><td>Fixed an issue where db-migrations failed during control plane upgrades in the <code>org-unit-service</code>.</td></tr><tr><td>2.24.73</td><td>04/27/2026</td><td>RUN-34639</td><td>Fixed an issue where the UI displayed impossible Free GPU values (allocated + free exceeding the node's total capacity) on nodes with fractional GPU allocations.</td></tr><tr><td>2.24.66</td><td>03/31/2026</td><td>RUN-37889</td><td>Fixed a security vulnerability related to GHSA-p77j-4mvh-x3m3 with severity HIGH.</td></tr><tr><td>2.24.65</td><td>03/25/2026</td><td>RUN-37702</td><td>Fixed a security vulnerability related to GHSA-p77j-4mvh-x3m3 with severity HIGH.</td></tr><tr><td>2.24.65</td><td>03/25/2026</td><td>RUN-36559</td><td>Fixed an issue where tenant-level policy permissions could not delete policies belonging to scopes that no longer exist.</td></tr><tr><td>2.24.61</td><td>03/19/2026</td><td>RUN-37611</td><td>Fixed an issue in the distributed workload submission form where a project policy with a locked rule on storage instances could result in a failure to submit the workload.</td></tr><tr><td>2.24.61</td><td>03/19/2026</td><td>RUN-37504</td><td>Fixed a security vulnerability related to CVE-2026-25679 with severity HIGH.</td></tr><tr><td>2.24.61</td><td>03/19/2026</td><td>RUN-37497</td><td>Fixed a security vulnerability related to CVE-2026-27142 with severity HIGH.</td></tr><tr><td>2.24.61</td><td>03/19/2026</td><td>RUN-37170</td><td>Fixed a security vulnerability related to GHSA-23c5-xmqv-rm74 with severity HIGH.</td></tr><tr><td>2.24.61</td><td>03/19/2026</td><td>RUN-37169</td><td>Fixed a security vulnerability related to GHSA-5rq4-664w-9x2c with severity HIGH.</td></tr><tr><td>2.24.58</td><td>03/11/2026</td><td>RUN-37341</td><td>Fixed a security vulnerability related to CVE-2025-61732 with severity HIGH.</td></tr><tr><td>2.24.58</td><td>03/11/2026</td><td>RUN-37174</td><td>Fixed a security vulnerability related to GHSA-72hv-8253-57qq with severity HIGH.</td></tr><tr><td>2.24.57</td><td>03/10/2026</td><td>RUN-36407</td><td>Fixed an issue where workspace workload submissions intermittently failed with a "Workload failed due to a Network issue" error.</td></tr><tr><td>2.24.56</td><td>03/09/2026</td><td>RUN-37278</td><td>Fixed a security vulnerability related to CVE-2024-1013 with severity HIGH.</td></tr><tr><td>2.24.56</td><td>03/09/2026</td><td>RUN-37167</td><td>Fixed a security vulnerability related to GHSA-72hv-8253-57qq with severity HIGH.</td></tr><tr><td>2.24.56</td><td>03/09/2026</td><td>RUN-36732</td><td>Fixed a security vulnerability related to GHSA-5vv4-hvf7-2h46 with severity HIGH.</td></tr><tr><td>2.24.54</td><td>03/05/2026</td><td>RUN-37515</td><td>Fixed a security vulnerability related to GHSA-9h8m-3fm2-qjrq with severity HIGH.</td></tr><tr><td>2.24.54</td><td>03/05/2026</td><td>RUN-36734</td><td>Fixed an issue where the Analytics table displayed incorrect GPU Compute Utilization values for Training and Interactive workloads.</td></tr><tr><td>2.24.54</td><td>03/05/2026</td><td>RUN-34564</td><td>Fixed an issue where updating a project with node type names in the payload did not return the node type names in the 200 success response.</td></tr><tr><td>2.24.52</td><td>02/26/2026</td><td>RUN-36370</td><td>Fixed an issue where NIM and HuggingFace inference templates failed to submit when a policy defined locked storage instances.</td></tr><tr><td>2.24.52</td><td>02/26/2026</td><td>RUN-36560</td><td>Fixed an issue where the Connect button did not open the workspace URL for workspaces submitted through YAML.</td></tr><tr><td>2.24.52</td><td>02/26/2026</td><td>RUN-37113</td><td>Fixed an issue where image strings that included a port number in the registry URL were not parsed correctly.</td></tr><tr><td>2.24.51</td><td>02/25/2026</td><td>RUN-37060</td><td>Fixed an issue where the NVLink total bytes per pod metric was labeled with GPU metrics labels instead of the expected pod labels.</td></tr><tr><td>2.24.51</td><td>02/25/2026</td><td>RUN-35612</td><td>Fixed a security vulnerability related to CVE-2025-64756 with severity HIGH.</td></tr><tr><td>2.24.51</td><td>02/25/2026</td><td>RUN-36443</td><td>Fixed an issue where the dashboard returned a 500 error instead of an informative error message.</td></tr><tr><td>2.24.49</td><td>02/17/2026</td><td>RUN-34472</td><td>Fixed an issue where the "Allocation ratio by node pool" widget in the Overview dashboard aggregated unlimited quotas together with other quotas, resulting in incorrect data.</td></tr><tr><td>2.24.49</td><td>02/17/2026</td><td>RUN-34624</td><td>Fixed an issue in Projects and Departments where GPU utilization/allocation metrics were not displayed if only partial data was available.</td></tr><tr><td>2.24.48</td><td>02/15/2026</td><td>RUN-35976</td><td>Fixed an issue where workloads submitted with names longer than 63 characters failed to schedule.</td></tr><tr><td>2.24.48</td><td>02/15/2026</td><td>RUN-35834</td><td>Fixed an issue where the AI practitioner role did not have read access to policies granted through workload submission permission sets (for example, <code>workspaceEditAccess</code>).</td></tr><tr><td>2.24.48</td><td>02/15/2026</td><td>RUN-36457</td><td>Fixed an issue where, on rare occasions, "Allocation ratio by node pool" widget would show incorrect data.</td></tr><tr><td>2.24.48</td><td>02/15/2026</td><td>RUN-35326</td><td>Fixed an issue where the Projects/Departments table in the Overview dashboard sometimes showed fewer than 15 projects/departments when their workloads did not have allocated GPUs or were not in Running or Pending status.</td></tr><tr><td>2.24.48</td><td>02/15/2026</td><td>RUN-34017</td><td>Fixed an issue where <code>runai template list</code> returned incorrect output when using <code>--page-size</code> and <code>--max-items</code> together.</td></tr><tr><td>2.24.48</td><td>02/15/2026</td><td>RUN-36505</td><td>Fixed an issue where, on rare occasions, there was a race condition in some of the metrics causing the average GPU utilization to be above 100%.</td></tr><tr><td>2.24.48</td><td>02/15/2026</td><td>RUn-36257</td><td>Fixed an issue in the flexible workload submission form where image pull secret section would present shared credentials instead of shared secrets resulting in a failure to submit the workload.</td></tr><tr><td>2.24.48</td><td>02/15/2026</td><td>RUn-36383</td><td>Fixed a security vulnerability related to GHSA-4f99-4q7p-p3gh with severity HIGH.</td></tr><tr><td>2.24.48</td><td>02/15/2026</td><td>RUN-36382</td><td>Fixed a security vulnerability related to GHSA-cv78-6m8q-ph82 with severity HIGH.</td></tr><tr><td>2.24.48</td><td>02/15/2026</td><td>RUN-36045</td><td>Fixed an issue where inference workload metrics were not being refreshed correctly.</td></tr><tr><td>2.24.48</td><td>02/15/2026</td><td>RUN-36254</td><td>Fixed an issue where a race condition during webhook certificate generation caused failures.</td></tr><tr><td>2.24.48</td><td>02/15/2026</td><td>RUN-36413</td><td>Fixed a security vulnerability related to CVE-2024-41110 with severity HIGH.</td></tr><tr><td>2.24.48</td><td>02/15/2026</td><td>RUN-36506</td><td>Fixed an issue where the UI shows the wrong GPU quotas for node pools associated with the “Default” department.</td></tr><tr><td>2.24.48</td><td>02/15/2026</td><td>RUN-36414</td><td>Fixed a security vulnerability related to CVE-2025-14459 and CVE-2025-64324 with severity HIGH.</td></tr><tr><td>2.24.48</td><td>02/15/2026</td><td>RUN-36381</td><td>Fixed a security vulnerability related to GHSA-jmp9-x22r-554x with severity HIGH.</td></tr><tr><td>2.24.48</td><td>02/15/2026</td><td>RUN-36122</td><td>Fixed an issue where credentials assets were not displayed in the Credentials table.</td></tr><tr><td>2.24.48</td><td>02/15/2026</td><td>RUN-36020</td><td>Fixed an issue where, when swap was enabled, the toolkit-reservation pod could enter an <em>OutOfMemory</em> state if the kubelet detected insufficient RAM at startup, and would not automatically recover once memory was freed.</td></tr><tr><td>2.24.48</td><td>02/15/2026</td><td>RUN-35511</td><td>Fixed an issue where an incorrect FQDN used during certificate generation caused errors.</td></tr><tr><td>2.24.48</td><td>02/15/2026</td><td>RUN-35443</td><td>Fixed a security vulnerability related to CVE-2025-68973 with severity HIGH.</td></tr><tr><td>2.24.48</td><td>02/15/2026</td><td>RUN-36010</td><td>Fixed an issue where navigating back to the root level in dashboard widgets caused the dashboard to crash.</td></tr><tr><td>2.24.48</td><td>02/15/2026</td><td>RUN-35620</td><td>Fixed an issue where providing an invalid admin password during installation caused the tenant to become permanently stuck.</td></tr><tr><td>2.24.17</td><td>01/25/2026</td><td>RUN-34593</td><td>Fixed an issue in the Overview dashboard where the Node pool filter did not work for the Idle workloads table.</td></tr><tr><td>2.24.17</td><td>01/25/2026</td><td>RUN-35148</td><td>Fixed an issue where charts in the Overview dashboard did not render data after the node pool filter was changed.</td></tr><tr><td>2.24.17</td><td>01/25/2026</td><td>RUN-35421</td><td>Fixed a security vulnerability related to CVE-2025-15284 with severity HIGH.</td></tr><tr><td>2.24.17</td><td>01/25/2026</td><td>RUN-35583</td><td>Fixed an issue where the <code>template describe</code> command did not display the master specification for distributed templates when the master and worker configurations differed.</td></tr><tr><td>2.24.17</td><td>01/25/2026</td><td>RUN-35594</td><td>Fixed an issue where the <code>workload describe</code> command did not display the master specification for distributed workloads.</td></tr><tr><td>2.24.17</td><td>01/25/2026</td><td>RUN-35637</td><td>Fixed an issue where, when CPU quota and Limit projects from exceeding department quota were both enabled, updating department or project memory quotas to very large values failed with incorrect validation errors, even though the values were valid.</td></tr><tr><td>2.24.17</td><td>01/25/2026</td><td>RUN-35922</td><td>Fixed a security vulnerability related to CVE-2026-0861 with severity HIGH.</td></tr></tbody></table>


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://run-ai-docs.nvidia.com/self-hosted/2.24/getting-started/whats-new/hotfixes-for-version-2.24.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
