dest-unreach / socat / contrib /
Under certain circumstances an FD leak occurs and may be misused for denial of service attacks against socat running in server mode (CVE-2013-3571, advisory)
A heap based buffer overflow vulnerability has been found with data that happens to be output on the READLINE address. Successful exploitation may allow an attacker to execute arbitrary code with the privileges of the socat process (CVE-2012-0219, advisory). Fixed versions are 188.8.131.52 and 2.0.0-b5. Patches are available in the download area.
Michael Hanselmann provided a patch that adds option openssl-compress to disable the compress feature of actual OpenSSL versions.
Vitali Shukela provided a patch that allows to use the original target address of an accepted connection in a socks or proxy address
Jan Just Keijser implemented proxy certificates and provided a patch
An extension for RFC 2217 support written by Kenneth Kassing is provided in the contrib section.
Thomas Schwinge and socats author performed some changes to make socat compile and (partially) run on GNU Hurd systems
These patches are already integrated into the actual socat distribution. Apply them to older socat versions only.
SCTP support for socat has already been requested. Before it could be added to the official distribution, Jonathan Brannan contributed a patch.
It is reported that new socat versions do not build on new Mac OS X versions. Camillo Lugaresi provided a patch that makes socat 184.108.40.206 compile and run on Mac OS X 10.4.
Use this patch if you already have socat 220.127.116.11 source and want to update to 18.104.22.168 but are low on bandwidth or have changed the source code.
Daniel Lucq found that socat might hang when invoked with many file descriptors already opened. Find more info and a patch to this problem.
James Sainsbury found a problem with socat's service name resolution and contributed a solution. Find more info and a patch.