Disregarding the "group" and "other" permissions, something being owned by root
means only root has total control over the file/directory.
Something being owned by another user means that user in addition to root has total control over that file. Now you have two entities that have total control over that file/directory, whereas before you only had one.
This is particularly bad for executables placed in the standard locations as other users on the system may call it, and the owning user can replace the executable at his/her will, possibly using it for malicious means. Hopefully on this system the user "bin" is prevented from logging in interactively via a null shell or similar in /etc/passwd
. I'm betting this is done to enable a package manager to not have to run as root. This in of itself probably brings other benefits.
However, if only the directory /usr/sbin is owned by bin, and not executables within, then it's not as bad.