The overlayfs implementation in the Linux kernel through 4.5.2 does not properly restrict the mount namespace, which allows local users to gain privileges by mounting an overlayfs filesystem on top of a FUSE filesystem, and then executing a crafted setuid program.
git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e9f57ebcba563e0cd532926cab83c92bb4d79360
people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-1576.html
www.halfdog.net/Security/2016/OverlayfsOverFusePrivilegeEscalation/
www.openwall.com/lists/oss-security/2016/02/24/8
www.openwall.com/lists/oss-security/2021/10/18/1
bugs.launchpad.net/bugs/1535150
launchpadlibrarian.net/235300093/0005-overlayfs-Be-more-careful-about-copying-up-sxid-file.patch
launchpadlibrarian.net/235300225/0006-overlayfs-Propogate-nosuid-from-lower-and-upper-moun.patch