A flaw was found in the way bind implemented tunable which limited simultaneous TCP client connections. A remote attacker could use this flaw to exhaust the pool of file descriptors available to named, potentially affecting network connections and the management of files such as log files or zone journal files. In cases where the named process is not limited by OS-enforced per-process limits, this could additionally potentially lead to exhaustion of all available free file descriptors on that system. (CVE-2018-5743 __)
Run yum update bind to update your system.
i686: bind-9.8.2-0.68.rc1.60.amzn1.i686 bind-utils-9.8.2-0.68.rc1.60.amzn1.i686 bind-libs-9.8.2-0.68.rc1.60.amzn1.i686 bind-chroot-9.8.2-0.68.rc1.60.amzn1.i686 bind-devel-9.8.2-0.68.rc1.60.amzn1.i686 bind-sdb-9.8.2-0.68.rc1.60.amzn1.i686 bind-debuginfo-9.8.2-0.68.rc1.60.amzn1.i686 src: bind-9.8.2-0.68.rc1.60.amzn1.src x86_64: bind-chroot-9.8.2-0.68.rc1.60.amzn1.x86_64 bind-debuginfo-9.8.2-0.68.rc1.60.amzn1.x86_64 bind-sdb-9.8.2-0.68.rc1.60.amzn1.x86_64 bind-9.8.2-0.68.rc1.60.amzn1.x86_64 bind-devel-9.8.2-0.68.rc1.60.amzn1.x86_64 bind-utils-9.8.2-0.68.rc1.60.amzn1.x86_64 bind-libs-9.8.2-0.68.rc1.60.amzn1.x86_64