On Thu, Feb 8, 2018 at 6:25 PM, Michael Orlitzky <m...@gentoo.org> wrote: > On 02/08/2018 06:12 PM, William Hubbs wrote: >> >> There is no bug here. The problem, as I said before in this thread, is >> that what goes in *sbin is arbitrary, and as Rich said, if you are >> relying on the path to prevent a non-root user from running something >> that only root should run, you are doing it wrong. All the user has to >> do is type a full path to a command and it will be run. > > The FHS says /usr/sbin is for "binaries used exclusively by the system > administrator." It's not arbitrary, and the test for what doesn't belong > there is obvious: if a regular user needs something in /usr/sbin, then > we put it in the wrong place. Adding /usr/sbin to PATH will hide the > fact that we put it in the wrong place, but it will still be in the > wrong place. >
Sounds like a good reason to refer bugs upstream, and hide them from users in the meantime, like basically every other distro does. -- Rich