ceph Ceph Deploy Vulnerabilities