Security

Warning

Important note about copy.fail (CVE-2026-31431)

Like all Linux-based machines since 2017, virtual machines and containers running Dataiku are affected by the copy.fail vulnerability. This notably affects the isolation provided by UIF, allowing regular users to break out of the isolated Unix user.

For Dataiku Cloud, the mitigation has already been applied on our whole infrastructure. No further action is required.

For Dataiku Custom installs, the OS is not managed by Dataiku. Please liaise with your OS provider. The “rmmod” mitigation shown at https://copy.fail/#mitigation may work. Note that it’s known not to work on RedHat 9 and derived distributions since the module is builtin

For Dataiku Cloud Stacks installs, please use the following procedure:

Run, as root:

dnf update --security
reboot

Note that if you reprovision, you must run it again.

For containerized execution and Dataiku itself running in containers, please refer to instructions from your Kubernetes cluster provider.

Warning

Important note about dirtyfrag.io / Copy Fail 2 (CVE-2026-43284 / CVE-2026-43500)

Like all Linux-based machines since 2017, virtual machines and containers running Dataiku are affected by the dirtyfrag.io vulnerabilities. This notably affects the isolation provided by UIF, allowing regular users to break out of the isolated Unix user.

For Dataiku Cloud, the mitigation has been applied on our whole infrastructure. No further action is required.

For Dataiku Custom installs, the OS is not managed by Dataiku. Please liaise with your OS provider. The mitigations shown at https://dirtyfrag.io may work.

For Dataiku Cloud Stacks installs, please use the following procedure:

Run, as root:

dnf update --security
reboot

Note that if you reprovision, you must run it again.

For containerized execution and Dataiku itself running in containers, please refer to instructions from your Kubernetes cluster provider.