It was found that glusterfs server does not properly sanitize file paths in the "trusted.io-stats-dump" extended attribute which is used by the "debug/io-stats" translator. Attacker can use this flaw to create files and execute arbitrary code. To exploit this attacker would require sufficient access to modify the extended attributes of files on a gluster volume.
{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_name": "glusterfs-client",
            "binary_version": "3.4.2-1ubuntu1+esm1"
        },
        {
            "binary_name": "glusterfs-common",
            "binary_version": "3.4.2-1ubuntu1+esm1"
        },
        {
            "binary_name": "glusterfs-server",
            "binary_version": "3.4.2-1ubuntu1+esm1"
        }
    ]
}
          {
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_name": "glusterfs-client",
            "binary_version": "3.7.6-1ubuntu1+esm1"
        },
        {
            "binary_name": "glusterfs-common",
            "binary_version": "3.7.6-1ubuntu1+esm1"
        },
        {
            "binary_name": "glusterfs-server",
            "binary_version": "3.7.6-1ubuntu1+esm1"
        }
    ]
}
          {
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_name": "glusterfs-client",
            "binary_version": "3.13.2-1ubuntu1+esm1"
        },
        {
            "binary_name": "glusterfs-common",
            "binary_version": "3.13.2-1ubuntu1+esm1"
        },
        {
            "binary_name": "glusterfs-server",
            "binary_version": "3.13.2-1ubuntu1+esm1"
        }
    ]
}