X-Git-Url: https://ruderich.org/simon/gitweb/?a=blobdiff_plain;f=shell%2Faliases.in;h=cb59d9c4fc3953ba3595930c93702099b3be0600;hb=d80ef8ee3f9d24ae0a17ec15eaf6137ab7781b7f;hp=eebda1ec1917c1cba1e15b5e9326f75886db9dab;hpb=10029386b0efedf07dcf368fdb2fcdd1c85017d0;p=config%2Fdotfiles.git diff --git a/shell/aliases.in b/shell/aliases.in index eebda1e..cb59d9c 100644 --- a/shell/aliases.in +++ b/shell/aliases.in @@ -71,7 +71,7 @@ unalias ls 2>/dev/null # See `setup.sh` for details. LS_* are replaced with the appropriate values # when this file is generated. ls() { - LS_ENV command ls LS_COLOR LS_OPTIONS -C -F "$@" 2>&1 | less + LS_ARGS -C -F "$@" 2>&1 | less } unalias ll lt la lal lat 2>/dev/null @@ -120,4 +120,14 @@ info() { command info "$@" 2>/dev/null | less } +# Using su (or sudo) as root to a less privileged user might allow the other +# user to run arbitrary commands as root. See also Debian bugs #628843 and +# #657784. +if test "`id -u`" -eq 0; then + su() { + echo 'never su as root' >&2 + return 1 + } +fi + # vim: ft=sh