Your message dated Mon, 07 Aug 2017 05:36:49 +0000
with message-id <>
and subject line Bug#794635: fixed in pwgen 2.08-1
has caused the Debian Bug report #794635,
regarding pwgen: password-deliminiting whitespace is used when generating only 
one password
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact

Debian Bug Tracking System
Contact with problems
--- Begin Message ---
Package: pwgen
Version: 2.07-1
Severity: normal

Dear Maintainer,

*** Reporter, please consider answering these questions, where appropriate ***

   * What led up to the situation?
   * What exactly did you do (or not do) that was effective (or

I used "pwgen 8 1" to generate a single password. Copy-pasting this password
with triple click in xterm included the invisible space character before the

   * What was the outcome of this action?

When pasting the output into the passwd command, a space was appended to the
password, which was unexpected. Thus logging in with the visible parts only
was not possible.

   * What outcome did you expect instead?

For the special case of generating only one password, pwgen should not
append a space character to the password. This way triple clicking and
copy-pasting will work as expected. 

A bit more information: pwgen seems to append a space to the last password
generated, which seems to be unnecessary. Fixing this will fix the one
password case too.

*** End of the template - remove these template lines ***

-- System Information:
Debian Release: stretch/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.16.7-ck2 (SMP w/2 CPU cores; PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)

Versions of packages pwgen depends on:
ii  libc6  2.19-19

pwgen recommends no packages.

pwgen suggests no packages.

-- no debconf information

--- End Message ---
--- Begin Message ---
Source: pwgen
Source-Version: 2.08-1

We believe that the bug you reported is fixed in the latest version of
pwgen, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
Theodore Y. Ts'o <> (supplier of updated pwgen package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing

Hash: SHA256

Format: 1.8
Date: Mon, 07 Aug 2017 00:51:45 -0400
Source: pwgen
Binary: pwgen pwgen-udeb
Architecture: source
Version: 2.08-1
Distribution: unstable
Urgency: medium
Maintainer: Theodore Y. Ts'o <>
Changed-By: Theodore Y. Ts'o <>
 pwgen      - Automatic Password generation
 pwgen-udeb - Automatic Password generation (udeb)
Closes: 454500 666725 695148 791908 794635 836334 846517 855495
 pwgen (2.08-1) unstable; urgency=medium
   * New upstream version
   * Suppress trailing space after the last password (Closes: #794635)
   * Make pwgen -s more "secure" for 1 and 2 character passwords
     (Closes: #666725)
   * Fix option parsing of "pwgen --no-capitalize --no-vowels" (Closes: #791908)
   * Add new option --remove-chars which removes chars from the set of
     characters used to generate passwords (Closes: #836334)
   * Add cross-compilation to debian/rules (Closes: #695148)
   * Update control and copyright files to point at pwgen at github for
     the home directory and primary git repository
     (Closes: #454500, #855495, #846517)
   * Update Debian policy compliance to 4.0.0
 3cba9e034d6380e23784290b5fb50b5850e14fd8 1708 pwgen_2.08-1.dsc
 6406deba61297784888c2ec0c14e3c735a85a2b6 54884 pwgen_2.08.orig.tar.gz
 024d8245b0745d5aaeac60bd098edd6419e402ac 488 pwgen_2.08.orig.tar.gz.asc
 468f887afe8aaa09fd4fa5c5232f319683404d08 5656 pwgen_2.08-1.debian.tar.xz
 eeb71a0f3520d36e60e0388df3e9020bf71ab05a 5633 pwgen_2.08-1_i386.buildinfo
 8ba952876ced56465dff1cdae42b61756b13a66656716a37bebd905857e4fee7 1708 
 dab03dd30ad5a58e578c5581241a6e87e184a18eb2c3b2e0fffa8a9cf105c97b 54884 
 b16dde245d7153f261ebc8de6d5226c4cd7bccd9f880e66697f17903fcad3b6c 488 
 3d2ebdf3b6692e9daabf30f334127bc1aea82228a5d8bcf2cce15bfd0cd76fdc 5656 
 ff47e66efe28deb4e82c6f896f4d998fa66235f6600020d70eecdc2e7199a89d 5633 
 8fd7df94642dfb98d5b2f622ed6f307a 1708 admin optional pwgen_2.08-1.dsc
 6cfba450ac6ff72d11e88a6b0b049165 54884 admin optional pwgen_2.08.orig.tar.gz
 5b3b27cc93f7b14c546a1f1abfece383 488 admin optional pwgen_2.08.orig.tar.gz.asc
 9ba3c88c4e447472ec889a90972f3ec5 5656 admin optional pwgen_2.08-1.debian.tar.xz
 0e1cec16f7ad6efb0ed6f14b95c7f0cd 5633 admin optional 



--- End Message ---

Reply via email to