Package: solaar Version: 1.0.1+dfsg-1 Followup-For: Bug #858071 Dear Maintainer,
Since this bug is still found in latest release and have been there for several years either solve this bug now or completely remove the package from Debian since the program in its presense state is more or less useless to everyone! -- System Information: Debian Release: bullseye/sid APT prefers unstable APT policy: (990, 'unstable'), (500, 'unstable-debug') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 5.2.0-2-amd64 (SMP w/16 CPU cores) Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_WARN, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=en_DK.UTF-8, LC_CTYPE=en_DK.UTF-8 (charmap=UTF-8), LANGUAGE=en_DK.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages solaar depends on: ii adduser 3.118 ii debconf [debconf-2.0] 1.5.73 ii gir1.2-gtk-3.0 3.24.10-1 ii passwd 1:4.7-2 ii python 2.7.16-1 ii python-gi 3.32.2-1 ii python-pyudev 0.21.0-1 ii udev 241-7 Versions of packages solaar recommends: ii gir1.2-notify-0.7 0.7.8-1 ii python-dbus 1.2.8-3 ii systemd 241-7 ii upower 0.99.10-1 Versions of packages solaar suggests: pn gir1.2-appindicator3-0.1 <none> pn solaar-gnome3 <none> -- debconf information: solaar/use_plugdev_group: false ---- This mail was virus scanned and spam checked before delivery. This mail is also DKIM signed. See header dkim-signature.