Red Hat File Integrity Operator Vulnerabilities