GNU Chess 6.2.7 allows attackers to execute arbitrary code via crafted PGN (Portable Game Notation) data. This is related to a buffer overflow in the use of a .tmp.epd temporary file in the cmd_pgnload and cmd_pgnreplay functions in frontend/cmd.cc.
Gentoo Linux Security Advisory 202107-28 - A buffer overflow in GNU Chess might allow arbitrary code execution. Versions less than 6.2.8-r1 are affected.