On Linux and Unix systems, the
/var/tmp/ locations are world writable. They are used to provide a common location for temporary files and are protected through the sticky bit so that users cannot remove files they don't own from the directory, even though the directory is world writable.
But despite this measure, there is a history of attacks against the
/var/tmp/ locations, such as race conditions with symbolic links and information leakage through (temporary or not) world or group-readable files generated within.
Polyinstantiated directories provide a neat solution to this problem: users get their own, private
/var/tmp/ instance. These directory instances are created upon login ...