Package: v4l-conf
Version: 3.94-1
Severity: minor
Tags: patch

Found some typos in '/usr/share/man/man8/v4l-conf.8.gz', see attached '.diff'.

Hope this helps...

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.6.9-1-686
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) (ignored: LC_ALL set to C)

Versions of packages v4l-conf depends on:
ii  libc6                2.3.2.ds1-20        GNU C Library: Shared libraries an
ii  libfontconfig1       2.3.1-2             generic font configuration library
ii  libfreetype6         2.1.7-2.3           FreeType 2 font engine, shared lib
ii  libice6              4.3.0.dfsg.1-12.0.1 Inter-Client Exchange library
ii  libsm6               4.3.0.dfsg.1-12.0.1 X Window System Session Management
ii  libx11-6             4.3.0.dfsg.1-12.0.1 X Window System protocol client li
ii  libxaw7              4.3.0.dfsg.1-12.0.1 X Athena widget set library
ii  libxext6             4.3.0.dfsg.1-12.0.1 X Window System miscellaneous exte
ii  libxft2              2.1.2-6             FreeType-based font drawing librar
ii  libxmu6              4.3.0.dfsg.1-12.0.1 X Window System miscellaneous util
ii  libxpm4              4.3.0.dfsg.1-12.0.1 X pixmap library
ii  libxrandr2           4.3.0.dfsg.1-12.0.1 X Window System Resize, Rotate and
ii  libxrender1          0.8.3-7             X Rendering Extension client libra
ii  libxt6               4.3.0.dfsg.1-12.0.1 X Toolkit Intrinsics
ii  libxv1               4.3.0.dfsg.1-12.0.1 X Window System video extension li
ii  xlibs                4.3.0.dfsg.1-12     X Keyboard Extension (XKB) configu
ii  zlib1g               1:1.2.2-4           compression library - runtime

-- no debconf information
23c23
< Query the X-Server using the XF86 DGA extention.  This is the default
---
> Query the X-Server using the XF86 DGA extension.  This is the default
66c66
< Hope I havn't any security flaws in there.  If you find one, drop me a 
---
> Hope I haven't any security flaws in there.  If you find one, drop me a 

Reply via email to