glusterfs is vulnerable to privilege escalation on gluster server nodes. An authenticated gluster client via TLS could use gluster cli with --remote-host command to add it self to trusted storage pool and perform privileged gluster operations like adding other machines to trusted storage pool, start, stop, and delete volumes.
{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "glusterfs-client",
"binary_version": "3.7.6-1ubuntu1+esm1"
},
{
"binary_name": "glusterfs-common",
"binary_version": "3.7.6-1ubuntu1+esm1"
},
{
"binary_name": "glusterfs-server",
"binary_version": "3.7.6-1ubuntu1+esm1"
}
]
}
{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "glusterfs-client",
"binary_version": "3.13.2-1ubuntu1+esm1"
},
{
"binary_name": "glusterfs-common",
"binary_version": "3.13.2-1ubuntu1+esm1"
},
{
"binary_name": "glusterfs-server",
"binary_version": "3.13.2-1ubuntu1+esm1"
}
]
}