Red Hat Upstream Vulnerabilities