I don’t know if there is anyone with the same problem that I currently have.
After performed scans with GVM - GSA V9.0.1 on different Ubuntu machines, I have detected that these machines are running Ubuntu 16.04 version and these machines containing vulnerability for OpenSSH service (OpenSSH Multiple Vulnerabilities Jan17 (Linux)), and it shows in the report that installed version is 7.2p2. Also, it shows that it is possible to put a vendor fix, so It leads me to verify if this vulnerability has a security patch and what is the recommended version. Simply I am going to the OS vendor web page and checking if this security vulnerability has a security patch and Yes it has, for my example, there is the proof - https://ubuntu.com/security/notices/USN-3538-1
My question is, how I can get rid of these false-positive results? My understanding is that GVM is checking only OS version to detect vulnerabilities, not an OS vendor backported security patches on services like OpenSSH.