RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys:
OpenSSL RSA key generation was found to be vulnerable to cache side-channel attacks. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover parts of the private key. (CVE-2018-0737 __)
Run yum update openssl to update your system.
i686: openssl-1.0.2k-8.107.amzn1.i686 openssl-devel-1.0.2k-8.107.amzn1.i686 openssl-debuginfo-1.0.2k-8.107.amzn1.i686 openssl-static-1.0.2k-8.107.amzn1.i686 openssl-perl-1.0.2k-8.107.amzn1.i686 src: openssl-1.0.2k-8.107.amzn1.src x86_64: openssl-debuginfo-1.0.2k-8.107.amzn1.x86_64 openssl-static-1.0.2k-8.107.amzn1.x86_64 openssl-1.0.2k-8.107.amzn1.x86_64 openssl-devel-1.0.2k-8.107.amzn1.x86_64 openssl-perl-1.0.2k-8.107.amzn1.x86_64