CERT.CHROOT

Use of 'chroot'

Vulnerability and risk

Incorrect usage of 'chroot' can introduce security vulnerabilities and its use should be controlled