A flaw was found in the patches used to fix the 'dirtycow' vulnerability (CVE-2016-5195) [1]. An attacker, able to run local code, can exploit a race condition in transparent huge pages to modify usually read-only huge pages.
Airlock WAF is not affected because the commit that introduced this issue was not backported to CentOS 6 or 7.
For all back-end systems running a Linux kernel we recommend to check whether the Linux distribution is affected. We recommend to patch affected systems since these systems typically rely on interactive unprivileged users or the risk of a remote command execution flaw in the system is non negligible.