Gentoo Linux Security Advisory 201309-4 - A buffer overflow in Snack could result in execution of arbitrary code or Denial of Service. Versions less than 2.2.10-r5 are affected.
e841dc2e7d3e6f589f1fab17da0112b1552116325967857159c221f1b79bcf53
Mandriva Linux Security Advisory 2013-126 - Two vulnerabilities have been discovered in Snack Sound Toolkit, which are caused due to missing boundary checks in the GetWavHeader() function when parsing either format sub-chunks or unknown sub-chunks. This can be exploited to cause a heap-based buffer overflow via specially crafted WAV files with overly large chunk sizes specified.
c4586b12972a3f70c184f4c2b3e28957a8101570e17f862e82dbe7d33a3f98cc