It was found that glusterfs server is vulnerable to multiple stack based buffer overflows due to functions in server-rpc-fopc.c allocating fixed size buffers using 'alloca(3)'. An authenticated attacker could exploit this by mounting a gluster volume and sending a string longer that the fixed buffer size to cause crash or potential code execution.
https://security.gentoo.org/glsa/201904-06
https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00021.html
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10907
https://access.redhat.com/errata/RHSA-2018:3470
https://access.redhat.com/errata/RHSA-2018:2608
https://access.redhat.com/errata/RHSA-2018:2607