Red Hat Shim Vulnerabilities