A vulnerability was found in llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket. Reference: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0edc3f703f7bcaf550774b5d43ab727bcd0fe06b https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3a359798b176183ef09efb7a3dc59abad1cc7104
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1758257]
kernel-5.3.6-100.fc29, kernel-headers-5.3.6-100.fc29, kernel-tools-5.3.6-100.fc29 has been pushed to the Fedora 29 stable repository. If problems still persist, please make note of it in this bug report.
Its kinda hard to consider this to be privilege escalation. It may be expected that raw sockets are not available to all users most people think of "networked" sockets, not this NFC protocol. In addition, no shipping versions of RHEL support this protocol.
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-17056