A privilege escalation flaw was found in gluster 3.x snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink.
lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html
access.redhat.com/errata/RHSA-2018:1136
access.redhat.com/errata/RHSA-2018:1137
access.redhat.com/errata/RHSA-2018:1275
access.redhat.com/errata/RHSA-2018:1524
bugzilla.redhat.com/show_bug.cgi?id=1558721
lists.debian.org/debian-lts-announce/2021/11/msg00000.html
security.gentoo.org/glsa/201904-06