A flaw was found in the way dic_unserialize function of glusterfs does not handle negative key length values. An attacker could use this flaw to read memory from other locations into the stored dict value.
{
    "binaries": [
        {
            "binary_name": "glusterfs-client",
            "binary_version": "3.4.2-1ubuntu1+esm1"
        },
        {
            "binary_name": "glusterfs-common",
            "binary_version": "3.4.2-1ubuntu1+esm1"
        },
        {
            "binary_name": "glusterfs-server",
            "binary_version": "3.4.2-1ubuntu1+esm1"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}
          {
    "binaries": [
        {
            "binary_name": "glusterfs-client",
            "binary_version": "3.7.6-1ubuntu1+esm1"
        },
        {
            "binary_name": "glusterfs-common",
            "binary_version": "3.7.6-1ubuntu1+esm1"
        },
        {
            "binary_name": "glusterfs-server",
            "binary_version": "3.7.6-1ubuntu1+esm1"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}
          {
    "binaries": [
        {
            "binary_name": "glusterfs-client",
            "binary_version": "3.13.2-1ubuntu1+esm1"
        },
        {
            "binary_name": "glusterfs-common",
            "binary_version": "3.13.2-1ubuntu1+esm1"
        },
        {
            "binary_name": "glusterfs-server",
            "binary_version": "3.13.2-1ubuntu1+esm1"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}