How to Deploy and Use Fedora Hummingbird for Secure, Rolling Container Images

By

Introduction

Fedora Hummingbird, announced at Red Hat Summit 2026, is a container-based rolling Fedora Linux distribution that delivers the latest software from upstream as soon as it’s available. It focuses on achieving near-zero CVE reports by using a distroless, image-based workflow that runs in containers, virtual machines, or even on bare metal. This guide walks you through the process of obtaining, booting, and verifying Fedora Hummingbird images, leveraging the same model used by Project Hummingbird and Project Bluefin.

How to Deploy and Use Fedora Hummingbird for Secure, Rolling Container Images
Source: fedoramagazine.org

What You Need

Step-by-Step Instructions

Step 1: Understand the Hummingbird Image Model

The central goal of Fedora Hummingbird is to stay as close to zero CVE reports as possible in every container image it ships. All architectural decisions—distroless images, minimal package footprints, hermetic builds, and pipeline automation—serve that goal. A distroless image contains only the application and its strict runtime dependencies: no package manager, no shell. This minimizes attack surface and reduces your vulnerability management burden.

Hummingbird uses a Konflux-based pipeline for fully isolated, reproducible builds from pinned package lists. The tool chunkah ensures efficient incremental updates by redownloading only changed parts of an image. Continuous vulnerability scanning via Syft and Grype detects and patches issues upstream — the pipeline then rebuilds, tests, and ships the updated image automatically.

Step 2: Pull a Hummingbird Image

The foundation for Fedora Hummingbird already ships from the Hummingbird containers repository. Use Podman or Docker to pull an image. For example, to get the latest Python distroless image:

podman pull quay.io/hummingbird/python:latest

Replace python with any of the 49 unique images (covering Python, Go, Node.js, Rust, Ruby, OpenJDK, .NET, PostgreSQL, nginx, and more). There are 157 variants including FIPS and multi-arch builds. You can also pull a specific variant:

podman pull quay.io/hummingbird/postgresql:16-fips

All images are built from 95%+ Fedora Rawhide packages, unmodified. The remaining packages come directly from upstream if Rawhide doesn’t carry them or isn’t new enough. The Hummingbird team contributes changes back to Fedora, ensuring alignment.

Step 3: Boot the Image

Fedora Hummingbird images can boot in various environments. Choose the method that fits your workflow:

If you’ve been following Project Hummingbird or Project Bluefin, you already know this model. Fedora Hummingbird applies it all the way down to the host OS.

How to Deploy and Use Fedora Hummingbird for Secure, Rolling Container Images
Source: fedoramagazine.org

Step 4: Verify Security Status

One of the biggest advantages of Fedora Hummingbird is that you skip the “CVE hell.” The team’s pipeline has already performed CVE triage, patching, and rebuilding before you even pull the image. To see the current CVE status across all images and variants, visit the live Hummingbird catalog. You can also scan the image locally with Syft/Grype to confirm:

syft quay.io/hummingbird/python:latest | grep CVE

Because the images are distroless, you’ll typically find zero CVEs for the application layer. Any remaining issues would be in the base layer, which the pipeline continuously monitors.

Step 5: Customize or Extend (Optional)

If you need to add your own application or modification, create a Dockerfile that starts from a Hummingbird image. Because the image has no package manager, you must include all dependencies at build time. For example:

FROM quay.io/hummingbird/python:latest
COPY myapp.py /app/
CMD ["python", "/app/myapp.py"]

When you push your own image, consider using the same Konflux pipeline patterns—or at least scanning it with Syft before deployment. The Hummingbird team welcomes contributions back to Fedora; if you need a package not yet in the catalog, you can request it or build your own variant following the contribution guidelines.

Tips for Success

By following these steps, you can deploy Fedora Hummingbird images with confidence, knowing they are built for security and freshness. The image-based workflow puts you in control while automating the tedious parts of vulnerability management.

Tags:

Related Articles

Recommended

Discover More

Kubernetes v1.36 Breaks Cycle of Policy Insecurity with Startup-Only Admission ControlsUnlocking the Cambrian Explosion: What New Fossil Discoveries Reveal About Early Animal EvolutionHow to Apply Critical Security Patches on Linux: A Step-by-Step GuideHow to Implement Shared Design Leadership Without ConfusionThe AI Revolution in Software Development: Reshaping Tools, Roles, and Lifecycles