Red Hat Ceph Vulnerabilities