The overlayfs implementation in the Linux kernel through 4.5.2 does not properly restrict the mount namespace, which allows local users to gain privileges by mounting an overlayfs filesystem on top of a FUSE filesystem, and then executing a crafted setuid program.
http://www.openwall.com/lists/oss-security/2016/02/24/8
http://www.halfdog.net/Security/2016/OverlayfsOverFusePrivilegeEscalation/
https://bugs.launchpad.net/bugs/1535150
http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-1576.html
Source: MITRE
Published: 2016-05-02
Updated: 2022-04-18
Type: NVD-CWE-noinfo
Base Score: 7.2
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact Score: 10
Exploitability Score: 3.9
Severity: HIGH
Base Score: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Impact Score: 5.9
Exploitability Score: 1.8
Severity: HIGH