But the bug still exists. And has existed in every version of Ubuntu since
hardy.
This packet was just captured on Xubuntu 13.04, one such packet is
broadcast every time I click the + icon in system-config-printer to add a
new printer.
20:49:59.203607 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP
(17), length 71)
192.168.8.7.56274 > 192.168.8.255.161: [udp sum ok] { SNMPv1 {
GetRequest(28) R=1 .1.3.6.1.2.1.25.3.2.1.2.1 } }
On 6 June 2013 16:11, Phillip Susi <email address hidden> wrote:
> Hardy has reached end of life, and this package is not present in later
> releases. Closing all related bugs.
>
> ** Changed in: cupsys (Ubuntu)
> Status: New => Invalid
>
> --
> You received this bug notification because you are subscribed to a
> duplicate bug report (525291).
> https://bugs.launchpad.net/bugs/345015
>
> Title:
> CUPS SNMP should not scan the entire local subnet by default
>
> To manage notifications about this bug go to:
> https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/345015/+subscriptions
>
But the bug still exists. And has existed in every version of Ubuntu since config- printer to add a
hardy.
This packet was just captured on Xubuntu 13.04, one such packet is
broadcast every time I click the + icon in system-
new printer.
20:49:59.203607 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP 168.8.7. 56274 > 192.168.8.255.161: [udp sum ok] { SNMPv1 { 1.2.1.25. 3.2.1.2. 1 } }
(17), length 71)
192.
GetRequest(28) R=1 .1.3.6.
On 6 June 2013 16:11, Phillip Susi <email address hidden> wrote:
> Hardy has reached end of life, and this package is not present in later /bugs.launchpad .net/bugs/ 345015 /bugs.launchpad .net/ubuntu/ +source/ cupsys/ +bug/345015/ +subscriptions
> releases. Closing all related bugs.
>
> ** Changed in: cupsys (Ubuntu)
> Status: New => Invalid
>
> --
> You received this bug notification because you are subscribed to a
> duplicate bug report (525291).
> https:/
>
> Title:
> CUPS SNMP should not scan the entire local subnet by default
>
> To manage notifications about this bug go to:
> https:/
>