Mandriva Linux Security Advisory 2010-183 - Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-line arguments. The updated packages have been patched to correct this issue.
ce4ec26320e3a54663217769dd4be57201ae58d59b01d7081e61695b78b5f974
Debian Linux Security Advisory 2090-1 - A stack overflow vulnerability was found in socat that allows an attacker to execute arbitrary code with the privileges of the socat process.
e75325919ff9e435844f12c7228be2dea1f036e4f765bccdf8c07b69f2bfc1c0