Protecting our hubs against the CopyFail kernel exploit

The recently disclosed CopyFail Linux kernel zero-day (CVE-2026-31431) opens up a way for code running inside a container to break out onto the underlying node. We took a close look at our hubs to confirm whether they were exposed, confirmed that our hubs are likely not at risk, and added another layer of protection just in case.

Are 2i2c’s hubs at risk? #

No - based on our testing and mitigation efforts, our hubs are not vulnerable to CopyFail.

Why do we think we’re not at risk? #

What else did we look into #

Acknowledgements #

  • Huge thanks to Georgiana for the deep dive into the exploit and whether we’re exposed here.
  • Thanks to Yuvi for the PR that reduces JupyterHub’s exposure to this back in 2021!
  • Thanks to iwanhae for the eBPF daemonset we deployed in Kubernetes, and to JupyterHub for the upstream kubespawner hardening that lowered our exposure.
  • Thanks to our collaborators at NASA VEDA for the ongoing conversations about hub security.


Thanks for reading! If you'd like to follow our work, join our mailing list or subscribe to our blog. You can read our community hub documentation or learn about membership.
Chris Holdgraf
Chris Holdgraf
Executive Director