__hot__: Re-loader 3.3 Full
Key take‑aways:
+-----------------+ gRPC/TLS +-------------------+ | Orchestrator |<----------->| rloaderd Daemon | +-----------------+ +-------------------+ ^ | | (CLI) | (seccomp‑sandboxed) v v +-----------------+ +-------------------+ | rlctl client | | Plug‑in Loader | +-----------------+ +-------------------+ | v +-------------------+ | .rlm Module(s) | +-------------------+ | Feature | Description | Impact | |---------|-------------|--------| | Delta‑Update Engine | Generates binary diffs between module versions; reduces OTA payload size by up to 70 % for large libraries. | Bandwidth savings for remote devices. | | Enhanced Crypto | Switch from RSA‑2048 to Ed25519; adds support for P‑256 ECDSA for legacy compatibility. | Faster verification, smaller signatures. | | Namespace‑Based Sandboxing | Each plug‑in runs in its own PID, mount, and network namespace with a strict seccomp profile. | Mitigates risk of malicious plug‑ins. | | Rollback‑Safe Loading | Automatic snapshot of previous module state; on failure the loader reverts automatically. | Improves reliability of hot‑patches. | | K8s Operator | New reloader-operator Helm chart for automated management of modules across a cluster. | Simplifies large‑scale deployment. | | Telemetry Opt‑Out Flag | --disable-telemetry enforced at compile‑time for privacy‑focused deployments. | Addresses compliance concerns. | | Improved Logging | Structured JSON logs with correlation IDs, compatible with ELK/EFK stacks. | Easier debugging and monitoring. | 5. Security Assessment 5.1 Threat Model (as defined by the vendor) | Actor | Goal | Attack Vector | |-------|------|----------------| | External Attacker | Load malicious code onto a target device | Compromise OTA server, supply unsigned modules, or steal signing keys | | Malicious Insider | Escalate privileges via plug‑in | Deploy a plug‑in with excessive capabilities, bypass seccomp | | Supply‑Chain Compromise | Introduce backdoor in the core loader | Modify source before build, tamper with binary distribution | 5.2 Security Controls | Control | Implementation | Effectiveness | |---------|----------------|----------------| | Signature Verification | Ed25519 signatures verified against a configurable keyring. | High (prevents tampering if keys are protected). | | Namespace & Seccomp | Default sandbox profile denies mount , ptrace , mknod , and most network syscalls. | Medium‑High (reduces blast radius). | | Mandatory Access Control (MAC) | Integration with SELinux/AppArmor profiles (optional). | Dependent on host policy. | | Audit Logging | All load/unload actions logged with user ID, timestamp, module hash. | High (detects abuse). | | Rollback Mechanism | Automatic revert on load failure (segfault, validation error). | Medium (prevents persistent crash). | | Key Management | Supports hardware‑backed HSM/YubiKey for signing; recommends rotating keys every 12 months. | High (if followed). | 5.3 Known Vulnerabilities (as of Apr 2026) | CVE | Description | Status | |-----|-------------|--------| | CVE‑2025‑4123 | Out‑of‑bounds read in the delta‑generation algorithm could lead to information disclosure. | Patched in 3.3.1 | | CVE‑2025‑4890 | Incomplete sanitisation of manifest JSON allowed path‑traversal when extracting resources. | Fixed in 3.3.2 | | CVE‑2024‑9987 | Improper handling of TLS renegotiation could allow a man‑in‑the‑middle to downgrade encryption. | Mitigated via forced TLS 1.3 in 3.2; still recommended to enforce server‑side verification. | | CVE‑2023‑7711 (Third‑party lib) | Vulnerable version of libprotobuf bundled with the CLI. | Updated in 3.3.0; users should verify package signatures. | re-loader 3.3 full
| Area | Status (3.3) | |------|--------------| | | Stable, backward‑compatible with 2.x API | | Supported Platforms | Linux (x86_64, ARM64), macOS (Intel, Apple‑silicon), Windows (limited) | | Security | Hardened signature verification, sandboxed plug‑ins, but still susceptible to supply‑chain risks if unsigned modules are used | | Performance | ≤ 2 % overhead on typical workloads; negligible impact on real‑time threads | | Community | Active mailing list, quarterly security audits, open‑source core (MIT‑style) with commercial plug‑ins | | Faster verification, smaller signatures
(Compiled from publicly‑available documentation, vendor releases, security‑research disclosures, and community discussions as of April 2026) 1. Executive Summary Re‑Loader 3.3 is the latest stable release of the Re‑Loader framework, a cross‑platform dynamic module‑loading and hot‑patching tool originally designed for embedded systems, IoT devices, and containerised Linux workloads. The 3.3 branch introduces a new plug‑in architecture, improved cryptographic verification, and a set of optional telemetry‑opt‑out features. | | Rollback‑Safe Loading | Automatic snapshot of