Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address.
http://www.securitytracker.com/id?1027064
http://www.securityfocus.com/bid/53510
http://www.openwall.com/lists/oss-security/2012/05/14/2
http://www.mandriva.com/security/advisories?name=MDVSA-2013:169
http://www.lwn.net/Articles/504742/
http://www.dest-unreach.org/socat/contrib/socat-secadv3.html
http://security.gentoo.org/glsa/glsa-201208-01.xml
http://secunia.com/advisories/49746
http://secunia.com/advisories/49105
http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081882.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081619.html