Gives a fake chroot environment. This is useful for allowing users to create their own chrooted environment and install other packages without the need for root privileges.
These details are provided for information only. No information here is legal advice and should not be used as such.
There are no reported vulnerabilities