Calls of `execve(..., NULL, ...)` should be rejected by the kernel. It's nonsense and was used in a recent attack: https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt This was reported back in 2008, too: https://bugzilla.kernel.org/show_bug.cgi?id=8408 It should be trivial to fix, though there may be some corner cases that don't like it, https://codesearch.debian.net/search?q=execve%5C+*%5C%28%5B%5E%2C%5D%2B%2C+*NULL&literal=0 such as valgrind's test suite: https://sources.debian.org/src/valgrind/1:3.18.1-1/none/tests/execve.c/?hl=22#L22 For the patch thread, see: https://lore.kernel.org/lkml/20220126114447.25776-1-ariadne@dereferenced.org