Package: solaar
Version: 1.0.1+dfsg-1
Followup-For: Bug #858071

Dear Maintainer,

Since this bug is still found in latest release and have been there for several 
years either solve this bug now or completely remove the package from Debian 
since the program in its presense state is more or less useless to everyone!

-- System Information:
Debian Release: bullseye/sid
  APT prefers unstable
  APT policy: (990, 'unstable'), (500, 'unstable-debug')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.2.0-2-amd64 (SMP w/16 CPU cores)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_WARN, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=en_DK.UTF-8, LC_CTYPE=en_DK.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_DK.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages solaar depends on:
ii  adduser                3.118
ii  debconf [debconf-2.0]  1.5.73
ii  gir1.2-gtk-3.0         3.24.10-1
ii  passwd                 1:4.7-2
ii  python                 2.7.16-1
ii  python-gi              3.32.2-1
ii  python-pyudev          0.21.0-1
ii  udev                   241-7

Versions of packages solaar recommends:
ii  gir1.2-notify-0.7  0.7.8-1
ii  python-dbus        1.2.8-3
ii  systemd            241-7
ii  upower             0.99.10-1

Versions of packages solaar suggests:
pn  gir1.2-appindicator3-0.1  <none>
pn  solaar-gnome3             <none>

-- debconf information:
  solaar/use_plugdev_group: false

----

This mail was virus scanned and spam checked before delivery.
This mail is also DKIM signed. See header dkim-signature.

Reply via email to