Red Hat Shadow Vulnerabilities