The Stack Clash is a vulnerability in the memory management of several operating systems including RHEL6. It can be exploited by attackers to corrupt memory, execute arbitrary code and obtain root privileges [1].
Exploits may be available soon. They will probably require local access to an affected system. This is not an issue for Airlock WAF because all local interactive users are trusted. Further, Airlock WAF does not expose services that pose a risk for remote exploitation of the vulnerability.
no action required.