Red Hat Ceph Storage Vulnerabilities