The remote Red Hat host is missing one or more security updates.
The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:3222 advisory. - kernel: use-after-free in sound/core/timer.c (CVE-2019-19807) - kernel: lockdown: bypass through ACPI write via efivar_ssdt (CVE-2019-20908) - kernel: kernel: DAX hugepages not considered during mremap (CVE-2020-10757) - kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (CVE-2020-10766) - kernel: Indirect Branch Prediction Barrier is force- disabled when STIBP is unavailable or enhanced IBRS is available. (CVE-2020-10767) - kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (CVE-2020-10768) - kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c (CVE-2020-12653) - kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c (CVE-2020-12654) - Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario (CVE-2020-12888) - kernel: lockdown: bypass through ACPI write via acpi_configfs (CVE-2020-15780) Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.