From ${URL} : Linux kernel built with the Filesystem wide access notification (CONFIG_FANOTIFY) support is vulnerable to an information leakage flaw. The leaked bytes could be accessed via read(2) call on the fanotify descriptor. A user/program could use this flaw to leak kernel memory bytes. Upstream fix: ------------- -> https://lkml.org/lkml/2013/6/3/128
CVE-2013-2148 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2148): The fill_event_metadata function in fs/notify/fanotify/fanotify_user.c in the Linux kernel through 3.9.4 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a read operation on the fanotify descriptor.
https://lkml.org/lkml/2013/6/3/128 is de1e0c40aceb9d5bff09c3a3b97b2f1b178af53f, in 3.10.6 onwards.