Content-Type: text/plain Content-Disposition: inline Content-Transfer-Encoding: binary MIME-Version: 1.0 X-Mailer: MIME-tools 5.507 (Entity 5.507) RT-Send-CC: X-RT-Original-Encoding: iso-8859-1 Content-Length: 396 I think just about all of the programs in the krb5 source tree will seg fault when argc is 0, and I'm generally not concerned about that. It might make sense for ksu to be careful because it's setuid, although I don't think getting a setuid program to perform a null dereference constitutes a vulnerability (I don't think operating systems allow setuid programs to dump core, for instance).