Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address.
secunia.com/advisories/49105
secunia.com/advisories/49746
security.gentoo.org/glsa/glsa-201208-01.xml
www.dest-unreach.org/socat/contrib/socat-secadv3.html
www.lwn.net/Articles/504742/
www.mandriva.com/security/advisories?name=MDVSA-2013:169
www.openwall.com/lists/oss-security/2012/05/14/2
www.osvdb.org/81969
www.securityfocus.com/bid/53510
www.securitytracker.com/id?1027064
lists.fedoraproject.org/pipermail/package-announce/2012-June/081619.html
lists.fedoraproject.org/pipermail/package-announce/2012-June/081882.html