Perform the following operations to locate the cause and fix the problems.
For more information, see the section "Handling Vulnerabilities".
In this case, configure a yum source suitable for your Linux OS, and fix the vulnerability again.
Switch to the yum source having the required package and fix the vulnerability again.
Servers need to access the Internet and use external yum sources to fix vulnerabilities. If your servers cannot access the Internet, or the external image sources cannot provide stable services, you can use the image source.
Old kernel versions often remain in servers after upgrade. You can run the verification commands to check whether the current kernel version meets the vulnerability fix requirements. If it does, ignore the vulnerability on the Linux Vulnerabilities tab of the Vulnerabilities page. You are not advised to delete the old kernel.
After the kernel vulnerability is fixed, restart the server. If the server is not restarted, the vulnerability alarm still exists.