A privilege escalation flaw was found in gluster 3.x snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink.
https://security.gentoo.org/glsa/201904-06
https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html
https://bugzilla.redhat.com/show_bug.cgi?id=1558721
https://access.redhat.com/errata/RHSA-2018:1524
https://access.redhat.com/errata/RHSA-2018:1275
https://access.redhat.com/errata/RHSA-2018:1137
https://access.redhat.com/errata/RHSA-2018:1136
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html