There is 1 open security issue in buster.
1 issue left for the package maintainer to handle:
GNU Chess 6.2.7 allows attackers to execute arbitrary code via crafted PGN (Portable Game Notation) data. This is related to a buffer overflow in the use of a .tmp.epd temporary file in the cmd_pgnload and cmd_pgnreplay functions in frontend/cmd.cc.
You can find information about how to handle this issue in the security team's documentation.