Dirty COW exploit CVE-2016-5195
Wait for RedHat (the CentOS upstream vendor) to issue an update, then CentOS will port that update over to the CentOS update repositories so you can simply patch via yum update
as normal.
DirtyCOW isn't that scary of a vulnerability. It requires the attacker already has some manner of shell access to your system.
RedHat has got it rated as a CVSSv3 score of 7.8/10, which means it's not something I'd patch outside of the normal monthly patch cycle. It's much more important that you're regularly patching your system at least monthly, as such vulnerabilities are hardly rare.
Update: CentOS has released a fix (Thanks, @Roflo!). Running a yum update
should get your system updated with a patched kernel.