The HTTP response-splitting protection mechanism in certain versions of PHP can be circumvented by using the carriage return control character %0d [1].
Airlock is not affected because PHP is not used in Airlock.
Airlock protects back-ends with it's own HTTP response splitting deny rule which considers both, carriage return (%0D) and new line (%0A) control characters.