step which must be made through the filesystem to reach that directory
from the root is scrutinized for vulnerabilities. The checks made
against each directory and symbolic link along the way are as follows:
-.IP 1.
+.IP " 1."
No step should be a directory which is world-writable unless its sticky
bit is set, and it's not the final step.
-.IP 2.
+.IP " 2."
No step should be a directory which is group-writable unless its sticky
bit is set, and it's not the final step. (However, see the
.B \-t
option below.)
-.IP 3.
+.IP " 3."
No step should be a directory owned by another user (other than root).
-.IP 4.
+.IP " 4."
No step should be a symbolic link inside a sticky directory and owned by
another user.
.PP
.B tmpdir
program finds a secure place for temporary files, creating one if
necessary. The criteria it uses to choose a place are as follows:
-.IP 1.
+.IP " 1."
The temporary directory must be owned by the user, and have mode 700
(i.e., readable, writable and searchable only by the owner).
-.IP 2.
+.IP " 2."
The path through the filesystem to the temporary directory must be
secure against modifications by other malicious users. See the
.BR chkpath (1)