This Metasploit module performs a container escape onto the host as the daemon user. It takes advantage of the SYS_MODULE capability. If that exists and the linux headers are available to compile on the target, then we can escape onto the host.
4887c5ec8feac2ef2684a86765594f2e67dc1492d28af41dbba2a666b6afd897