{"id":48561,"date":"2022-09-22T17:47:27","date_gmt":"2022-09-22T17:47:27","guid":{"rendered":"http:\/\/2ce4110c-c967-40da-8a1b-0d4ec9ca7bd6"},"modified":"2022-09-22T17:47:27","modified_gmt":"2022-09-22T17:47:27","slug":"chainguard-releases-wolfi-a-linux-undistribution","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/chainguard-releases-wolfi-a-linux-undistribution\/","title":{"rendered":"Chainguard releases Wolfi, a Linux &#8216;undistribution&#8217;"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/4a7912e2273c1e56fdfe27f74976d454cd6e6b01\/2022\/01\/18\/b0256ff2-881d-45cf-ba36-63708db9a6b1\/open-source.jpg?auto=webp&amp;width=768\" alt=\"Open source visualization with icons and a hand pointing\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/9a7459272d32ee01d242a4954196feddc07314f7\/2022\/01\/18\/b0256ff2-881d-45cf-ba36-63708db9a6b1\/open-source.jpg?auto=webp&amp;width=1024\" alt=\"Open source visualization with icons and a hand pointing\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/e28179acacd5e91e7a6feaba1d378f56b8aa6791\/2022\/01\/18\/b0256ff2-881d-45cf-ba36-63708db9a6b1\/open-source.jpg?auto=webp&amp;width=1200\" alt=\"Open source visualization with icons and a hand pointing\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/e28179acacd5e91e7a6feaba1d378f56b8aa6791\/2022\/01\/18\/b0256ff2-881d-45cf-ba36-63708db9a6b1\/open-source.jpg?auto=webp&amp;width=1200\" alt=\"Open source visualization with icons and a hand pointing\" height=\"801.75\" width=\"1200\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----> <!----><\/div>\n<p> <!----><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Wright Studio\/Shutterstock<\/span><\/figcaption><\/figure>\n<p>There are many Linux distributions designed expressly for containers. Even Microsoft has one, <a href=\"https:\/\/github.com\/microsoft\/CBL-Mariner\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Common Base Linux (CBL)-Mariner<\/a>. Others include <a href=\"https:\/\/www.alpinelinux.org\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Alpine Linux<\/a>, <a href=\"https:\/\/flatcar-linux.org\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Flatcar Container Linux<\/a>, <a href=\"https:\/\/docs.openshift.com\/container-platform\/4.8\/architecture\/architecture-rhcos.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Red Hat Enterprise Linux CoreOS (<\/a><a href=\"https:\/\/docs.openshift.com\/container-platform\/4.8\/architecture\/architecture-rhcos.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">RHCOS<\/a><a href=\"https:\/\/docs.openshift.com\/container-platform\/4.8\/architecture\/architecture-rhcos.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">)<\/a>, and <a href=\"https:\/\/rancher.com\/docs\/os\/v1.x\/en\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">RancherOS<\/a>. Now <a href=\"https:\/\/www.chainguard.dev\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Chainguard<\/a>, a cloud-native software security company, has a new take on this popular cloud-friendly kind of Linux: Wolfi, an &#8220;undistribution.&#8221;&nbsp;<\/p>\n<p>I asked Chainguard CEO and founder Dan Lorenc at <a href=\"https:\/\/events.linuxfoundation.org\/open-source-summit-europe\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Open Source Summit Europe<\/a> in Dublin what he meant by an &#8220;undistrbution.&#8221; He explained, &#8220;We call it an undistribution because that&#8217;s technically correct. Inside of a container, you have everything but Linux, right? So, even though it&#8217;s based on Linux, it&#8217;s not really correct to call it a Linux distribution.&#8221;&nbsp;<\/p>\n<p>What most people call a Linux container, Lorenc continued, is &#8220;a distro that boots up on hardware and gets you to a container runtime. Alpine is probably the most heavily used such distro. Wolfi is the opposite of this. It&#8217;s distroless. It&#8217;s minimal to the point of not even having a package manager.&#8221; It has just enough to run your containerized application, and that&#8217;s it. &nbsp;<\/p>\n<p>To make this new Linux variant, Lorenc said, &#8220;We hired a bunch of the original Alpine team. But, Alpine was never designed for containers. It was originally designed for routers, firmware, and that kind of thing. What made it attractive for containers was its size and security.&#8221; Wolfi takes that minimal approach to an extreme for the sake of security.&nbsp;<\/p>\n<p><strong>Also:<\/strong> <a href=\"https:\/\/www.zdnet.com\/article\/linus-torvalds-rust-will-go-into-linux-6-1\/\" rel=\"follow\"><strong>Rust will go into Linux 6.1, Linus Torvalds says<\/strong><\/a><\/p>\n<p>Lorenc explained, &#8220;We believe in minimizing dependencies as much as possible, which simplifies auditing, updating, and transferring images, as well as reducing the potential attack surface. Wolfi [named for the smallest and most flexible octopus] is designed from the ground up to take full advantage of these containerized environments while maximizing security.&#8221; &nbsp;<\/p>\n<p>Wolfi does more than just cut out all the fat to secure itself. It also comes with built-in software supply chain security measures. Specifically, key features are:&nbsp;<\/p>\n<ul>\n<li>Based on the <a href=\"https:\/\/pkgs.alpinelinux.org\/packages\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Alpine Package (APK)<\/a> format&nbsp;<\/li>\n<li>Packages are of an appropriate granularity and independence to support minimal images&nbsp;<\/li>\n<li>Comes with a high-quality, build-time&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/securing-the-open-source-ecosystem-sboms-are-no-longer-optional\/\" rel=\"follow\">software bill of materials (SBOM)<\/a> for all packages<\/li>\n<li>Fully declarative and reproducible build system&nbsp;<\/li>\n<\/ul>\n<p>In practice, Chainguard&#8217;s distroless images are rebuilt daily from upstream sources. The images are signed via <a href=\"https:\/\/www.sigstore.dev\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Sigstore<\/a>, the standard for signing and verifying code, and described in an SBOM. This signature can be verified to show that the image is the one you wanted and is free of any tampering. &nbsp;<\/p>\n<p>Chainguard claims that every single package in these images is reproducible by default. In other words, you&#8217;ll get the same image if you build the package yourself from the source code. This is also guaranteed by Supply Chain Levels for Software Artifacts (SLSA, pronounced salsa). This is a source-to-service security framework for ensuring the integrity of software artifacts by protecting against unauthorized software package changes. &nbsp;<\/p>\n<p><strong>Also:<\/strong> <a href=\"https:\/\/www.zdnet.com\/article\/programming-languages-its-time-to-stop-using-c-and-c-for-new-projects-says-microsoft-azure-cto\/\" rel=\"follow\"><strong>It&#8217;s time to stop using C and C++ for new projects, says Microsoft Azure CTO<\/strong><\/a><\/p>\n<p>All these signatures, provenance, and SBOMs are stored in a new <a href=\"https:\/\/opencontainers.org\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Open Container Initiative (OCI)<\/a> registry alongside the images. You can then check on them with Sigstore&#8217;s<a href=\"https:\/\/github.com\/sigstore\/cosign\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"> cosign<\/a> tools so you can trust the images. &nbsp;&nbsp;<\/p>\n<p>Ironically, Lorenc said, &#8220;By keeping everything up-to-date and minimizing the number of dependencies,&#8221; Chainguard makes it so that &#8220;code security scanners such as <a href=\"https:\/\/github.com\/anchore\/grype\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">grype<\/a>, <a href=\"https:\/\/snyk.io\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Snyk<\/a>, and <a href=\"https:\/\/www.aquasec.com\/products\/trivy\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">trivy<\/a> report so few vulnerabilities for our images, people sometimes think their scanners aren&#8217;t working. But this reduction dramatically reduces the burden on teams responsible for investigating and mitigating potential security issues.&#8221; &nbsp;<\/p>\n<p>Besides Wolfi, Chainguard is updating its <a href=\"https:\/\/www.chainguard.dev\/chainguard-images\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Chainguard Images<\/a>, including&nbsp;<a href=\"https:\/\/github.com\/distroless\/static\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">base images for stand-alone binaries<\/a>, applications like <a href=\"https:\/\/github.com\/distroless\/nginx\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Nginx<\/a>, and development toolings such as its <a href=\"https:\/\/github.com\/distroless\/go\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"> Go<\/a> and<a href=\"https:\/\/github.com\/distroless\/gcc-musl\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"> C<\/a> compilers. &nbsp;&nbsp;<\/p>\n<p>So, if you like the idea of having the newest code and full supply chain security baked into your images, I strongly suggest you give Wolfi a try. You can do that by browsing and selecting images from the <a href=\"https:\/\/github.com\/distroless\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Wolfi GitHub repository<\/a>, They come with how-to documentation and can be integrated easily into your existing production pipelines. And, of course, you can check the security signing and SBOMs with the <a href=\"https:\/\/github.com\/sigstore\/cosign\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">cosign<\/a> tool.<\/p>\n<p><strong>Related stories:<\/strong>&nbsp;<\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/chainguard-releases-wolfi-a-linux-undistribution\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Chainguard takes a new approach to building a container Linux with all the security you&#8217;d need already baked in.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-48561","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Chainguard releases Wolfi, a Linux &#039;undistribution&#039; 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/chainguard-releases-wolfi-a-linux-undistribution\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Chainguard releases Wolfi, a Linux &#039;undistribution&#039; 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/chainguard-releases-wolfi-a-linux-undistribution\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-22T17:47:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/e28179acacd5e91e7a6feaba1d378f56b8aa6791\/2022\/01\/18\/b0256ff2-881d-45cf-ba36-63708db9a6b1\/open-source.jpg?auto=webp&amp;width=1200\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/chainguard-releases-wolfi-a-linux-undistribution\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/chainguard-releases-wolfi-a-linux-undistribution\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Chainguard releases Wolfi, a Linux &#8216;undistribution&#8217;\",\"datePublished\":\"2022-09-22T17:47:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/chainguard-releases-wolfi-a-linux-undistribution\\\/\"},\"wordCount\":731,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/chainguard-releases-wolfi-a-linux-undistribution\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/e28179acacd5e91e7a6feaba1d378f56b8aa6791\\\/2022\\\/01\\\/18\\\/b0256ff2-881d-45cf-ba36-63708db9a6b1\\\/open-source.jpg?auto=webp&amp;width=1200\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/chainguard-releases-wolfi-a-linux-undistribution\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/chainguard-releases-wolfi-a-linux-undistribution\\\/\",\"name\":\"Chainguard releases Wolfi, a Linux 'undistribution' 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/chainguard-releases-wolfi-a-linux-undistribution\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/chainguard-releases-wolfi-a-linux-undistribution\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/e28179acacd5e91e7a6feaba1d378f56b8aa6791\\\/2022\\\/01\\\/18\\\/b0256ff2-881d-45cf-ba36-63708db9a6b1\\\/open-source.jpg?auto=webp&amp;width=1200\",\"datePublished\":\"2022-09-22T17:47:27+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/chainguard-releases-wolfi-a-linux-undistribution\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/chainguard-releases-wolfi-a-linux-undistribution\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/chainguard-releases-wolfi-a-linux-undistribution\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/e28179acacd5e91e7a6feaba1d378f56b8aa6791\\\/2022\\\/01\\\/18\\\/b0256ff2-881d-45cf-ba36-63708db9a6b1\\\/open-source.jpg?auto=webp&amp;width=1200\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/e28179acacd5e91e7a6feaba1d378f56b8aa6791\\\/2022\\\/01\\\/18\\\/b0256ff2-881d-45cf-ba36-63708db9a6b1\\\/open-source.jpg?auto=webp&amp;width=1200\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/chainguard-releases-wolfi-a-linux-undistribution\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Chainguard releases Wolfi, a Linux &#8216;undistribution&#8217;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Chainguard releases Wolfi, a Linux 'undistribution' 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/chainguard-releases-wolfi-a-linux-undistribution\/","og_locale":"en_US","og_type":"article","og_title":"Chainguard releases Wolfi, a Linux 'undistribution' 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/chainguard-releases-wolfi-a-linux-undistribution\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-09-22T17:47:27+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/e28179acacd5e91e7a6feaba1d378f56b8aa6791\/2022\/01\/18\/b0256ff2-881d-45cf-ba36-63708db9a6b1\/open-source.jpg?auto=webp&amp;width=1200","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/chainguard-releases-wolfi-a-linux-undistribution\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/chainguard-releases-wolfi-a-linux-undistribution\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Chainguard releases Wolfi, a Linux &#8216;undistribution&#8217;","datePublished":"2022-09-22T17:47:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/chainguard-releases-wolfi-a-linux-undistribution\/"},"wordCount":731,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/chainguard-releases-wolfi-a-linux-undistribution\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/e28179acacd5e91e7a6feaba1d378f56b8aa6791\/2022\/01\/18\/b0256ff2-881d-45cf-ba36-63708db9a6b1\/open-source.jpg?auto=webp&amp;width=1200","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/chainguard-releases-wolfi-a-linux-undistribution\/","url":"https:\/\/www.threatshub.org\/blog\/chainguard-releases-wolfi-a-linux-undistribution\/","name":"Chainguard releases Wolfi, a Linux 'undistribution' 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/chainguard-releases-wolfi-a-linux-undistribution\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/chainguard-releases-wolfi-a-linux-undistribution\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/e28179acacd5e91e7a6feaba1d378f56b8aa6791\/2022\/01\/18\/b0256ff2-881d-45cf-ba36-63708db9a6b1\/open-source.jpg?auto=webp&amp;width=1200","datePublished":"2022-09-22T17:47:27+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/chainguard-releases-wolfi-a-linux-undistribution\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/chainguard-releases-wolfi-a-linux-undistribution\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/chainguard-releases-wolfi-a-linux-undistribution\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/e28179acacd5e91e7a6feaba1d378f56b8aa6791\/2022\/01\/18\/b0256ff2-881d-45cf-ba36-63708db9a6b1\/open-source.jpg?auto=webp&amp;width=1200","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/e28179acacd5e91e7a6feaba1d378f56b8aa6791\/2022\/01\/18\/b0256ff2-881d-45cf-ba36-63708db9a6b1\/open-source.jpg?auto=webp&amp;width=1200"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/chainguard-releases-wolfi-a-linux-undistribution\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Chainguard releases Wolfi, a Linux &#8216;undistribution&#8217;"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48561","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=48561"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48561\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=48561"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=48561"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=48561"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}