Stack-based buffer overflow in the strip_vt102_codes function in TinTin++ 2.01.6 allows remote attackers to execute arbitrary code by sending a long message to the client. References: https://tintin.sourceforge.io/forum/viewtopic.php?f=1&t=2584&sid=31b77bb001faea9269bf224280960e29#p10505 https://tintin.sourceforge.io/news.php https://trustfoundry.net/cve-2019-7629-rce-in-an-open-source-mud-client/
Created tintin tracking bugs for this issue: Affects: fedora-all [bug 1678688]
The update was already waiting in updates-testing (and is now in stable). I didn't edit it to reference these bugs after pushing it. I'm going to close this now.