From ${URL} : > Double-clicking a file in the user's media library with > a specially-crafted path or filename allows for > arbitrary code execution with the permissions of the > user running Pitivi. This issue was fixed upstream in 0.95 with commit 45a4c84edb3b4343f199bba1c65502e3f49f5bb2[1]. 1] https://git.gnome.org/browse/pitivi/commit/?id=45a4c84edb3b4343f199bba1c65502e3f49f5bb2 @maintainer(s): since the fixed version is already in the tree, please remove the affected versions.
pitivi < 0.95 cleaned up.
closing as noglsa