summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorspz <spz@pkgsrc.org>2012-03-12 18:06:49 +0000
committerspz <spz@pkgsrc.org>2012-03-12 18:06:49 +0000
commitaa7d4b972679150ad585b466fb04402daf7c6506 (patch)
treea4f1ce1b0020761ffa49d5b128850d01257da349
parent42f6210493b78a7bf315870283a25f56464a78a9 (diff)
downloadpkgsrc-aa7d4b972679150ad585b466fb04402daf7c6506.tar.gz
Pullup ticket #3701 - requested by drochner
textproc/libxml2: security fix and HEAD compatibility Revisions pulled up: - textproc/libxml2/Makefile 1.113-1.114 - textproc/libxml2/distinfo 1.88-1.89 - textproc/libxml2/patches/patch-CVE-2012-0841-aa 1.1 - textproc/libxml2/patches/patch-CVE-2012-0841-ab 1.1 - textproc/libxml2/patches/patch-CVE-2012-0841-ac 1.1 - textproc/libxml2/patches/patch-aa 1.24 - textproc/libxml2/patches/patch-ab 1.22 - textproc/libxml2/patches/patch-am 1.1 ------------------------------------------------------------------- Module Name: pkgsrc Committed By: drochner Date: Wed Feb 22 11:10:18 UTC 2012 Modified Files: pkgsrc/textproc/libxml2: Makefile distinfo pkgsrc/textproc/libxml2/patches: patch-aa patch-ab Added Files: pkgsrc/textproc/libxml2/patches: patch-am Log Message: build the library thread-aware, i.e. use <pthread.h> but do not link against libpthread. (It doesn't create threads, just uses locking.) This seems to be wanted by some applications, eg vlc issues a warning on startup (with no visible consequences afaict, but anyway). I hope this works for other OSes too. If not, we should probably add support for these cases to mk/pthread.bl3.mk. bump PKGREV To generate a diff of this commit: cvs rdiff -u -r1.112 -r1.113 pkgsrc/textproc/libxml2/Makefile cvs rdiff -u -r1.87 -r1.88 pkgsrc/textproc/libxml2/distinfo cvs rdiff -u -r1.23 -r1.24 pkgsrc/textproc/libxml2/patches/patch-aa cvs rdiff -u -r1.21 -r1.22 pkgsrc/textproc/libxml2/patches/patch-ab cvs rdiff -u -r0 -r1.1 pkgsrc/textproc/libxml2/patches/patch-am ------------------------------------------------------------------- Module Name: pkgsrc Committed By: drochner Date: Fri Mar 9 12:12:28 UTC 2012 Modified Files: pkgsrc/textproc/libxml2: Makefile distinfo Added Files: pkgsrc/textproc/libxml2/patches: patch-CVE-2012-0841-aa patch-CVE-2012-0841-ab patch-CVE-2012-0841-ac Log Message: Add patch from upstream to add hash randomization. Without that, (untrusted) input can fill hash buckets uneven, causing high CPU load. (CVE-2012-0841) To get a patch which is simple enough to get pulled up to the stable pkgsrc branch, I've not touched "configure" but just assumed that the POSIX functions rand(), srand() and time() are present. bump PKGREV To generate a diff of this commit: cvs rdiff -u -r1.113 -r1.114 pkgsrc/textproc/libxml2/Makefile cvs rdiff -u -r1.88 -r1.89 pkgsrc/textproc/libxml2/distinfo cvs rdiff -u -r0 -r1.1 pkgsrc/textproc/libxml2/patches/patch-CVE-2012-0841-aa \ pkgsrc/textproc/libxml2/patches/patch-CVE-2012-0841-ab \ pkgsrc/textproc/libxml2/patches/patch-CVE-2012-0841-ac
-rw-r--r--textproc/libxml2/Makefile15
-rw-r--r--textproc/libxml2/distinfo10
-rw-r--r--textproc/libxml2/patches/patch-CVE-2012-0841-aa176
-rw-r--r--textproc/libxml2/patches/patch-CVE-2012-0841-ab93
-rw-r--r--textproc/libxml2/patches/patch-CVE-2012-0841-ac15
-rw-r--r--textproc/libxml2/patches/patch-aa15
-rw-r--r--textproc/libxml2/patches/patch-ab28
-rw-r--r--textproc/libxml2/patches/patch-am13
8 files changed, 353 insertions, 12 deletions
diff --git a/textproc/libxml2/Makefile b/textproc/libxml2/Makefile
index c482268aa48..a66b05005b3 100644
--- a/textproc/libxml2/Makefile
+++ b/textproc/libxml2/Makefile
@@ -1,7 +1,7 @@
-# $NetBSD: Makefile,v 1.110.2.2 2012/01/19 06:07:36 sbd Exp $
+# $NetBSD: Makefile,v 1.110.2.3 2012/03/12 18:06:49 spz Exp $
DISTNAME= libxml2-2.7.8
-PKGREVISION= 6
+PKGREVISION= 8
CATEGORIES= textproc
MASTER_SITES= ftp://xmlsoft.org/libxml2/ \
http://xmlsoft.org/sources/
@@ -27,9 +27,9 @@ CONFIGURE_ARGS+= --without-python
.include "options.mk"
-# Don't use threads - it's not apparent whether it's necessary or not,
-# and this library needs to be usable by non-threaded applications too
-CONFIGURE_ARGS+= --without-threads
+# allow thread-awareness, but make sure the library is not
+# linked against libpthread
+#CONFIGURE_ARGS+= --without-threads
MAKE_ENV+= PAX=${PAX:Q}
@@ -43,6 +43,11 @@ SUBST_FILES.cat= catalog.c xmlcatalog.c
SUBST_SED.cat= -e "s,@@SGML_DEFAULT_CATALOG@@,${SGML_DEFAULT_CATALOG},g"
SUBST_SED.cat+= -e "s,@@XML_DEFAULT_CATALOG@@,${XML_DEFAULT_CATALOG},g"
+# XXX make sure the library is not linked against libpthread
+post-install:
+ test -z "`ldd ${DESTDIR}${PREFIX}/lib/libxml2.so | grep pthread`"
+
+.include "../../mk/pthread.buildlink3.mk"
.include "../../devel/zlib/buildlink3.mk"
.include "../../converters/libiconv/buildlink3.mk"
.include "../../textproc/xmlcatmgr/catalogs.mk"
diff --git a/textproc/libxml2/distinfo b/textproc/libxml2/distinfo
index 39c9a86df2c..32a6e786c4a 100644
--- a/textproc/libxml2/distinfo
+++ b/textproc/libxml2/distinfo
@@ -1,10 +1,13 @@
-$NetBSD: distinfo,v 1.84.2.2 2012/01/19 06:07:36 sbd Exp $
+$NetBSD: distinfo,v 1.84.2.3 2012/03/12 18:06:49 spz Exp $
SHA1 (libxml2-2.7.8.tar.gz) = 859dd535edbb851cc15b64740ee06551a7a17d40
RMD160 (libxml2-2.7.8.tar.gz) = 30709622cfe3e2175e73d6701b7e19a25ab5ac47
Size (libxml2-2.7.8.tar.gz) = 4881808 bytes
-SHA1 (patch-aa) = bf7db00ddf8a36394521baf656cf83d99bd9cbd3
-SHA1 (patch-ab) = e1cb25ae1b2219af91d11f0ccdbb12912d50488a
+SHA1 (patch-CVE-2012-0841-aa) = b5fcb53c69ab808aafbaa81e9a4bef3f69057ff8
+SHA1 (patch-CVE-2012-0841-ab) = 2fd0d1a610bc517c4062f5ba30ec546d153eb5a1
+SHA1 (patch-CVE-2012-0841-ac) = 3ee79a6ecaf498ae0db4f64a10e22cc3e515e1e3
+SHA1 (patch-aa) = 965bfc2226828b5161a4541cf73f5b5ef9a7e88e
+SHA1 (patch-ab) = d8dfd5bd9632d32c7e32e35e4d4735e510fc438f
SHA1 (patch-ac) = 264c75cf9fff5319105b971c122cdf5fc103c04e
SHA1 (patch-ad) = cd45da492b02cce9983c46762839f68b8b1e0177
SHA1 (patch-ae) = b8d8e0275cab3caafd98275ac22b63951fc4b5fd
@@ -12,5 +15,6 @@ SHA1 (patch-ag) = ab4aeeb8ca696b88285274760ab3ef08800773a0
SHA1 (patch-aj) = 24eb4a08ea4c40be6d75a72cd0bb5280514f73d4
SHA1 (patch-ak) = 5e0e9807d7ae0bc93a5583a61bb88a49ec1751e8
SHA1 (patch-al) = 45f984fef5cf5d04c46e940867707897396a9c9f
+SHA1 (patch-am) = ae7ab69b7bba2271d2d996161cc8b9956d0b06fa
SHA1 (patch-include_libxml_xpath.h) = 3fc74551a7843668cf9ffee19b1f20ccb674e153
SHA1 (patch-xpointer.c) = fa720fd515bab3f99bb11bf56320b3ad8e5fb211
diff --git a/textproc/libxml2/patches/patch-CVE-2012-0841-aa b/textproc/libxml2/patches/patch-CVE-2012-0841-aa
new file mode 100644
index 00000000000..7f01cd3da5b
--- /dev/null
+++ b/textproc/libxml2/patches/patch-CVE-2012-0841-aa
@@ -0,0 +1,176 @@
+$NetBSD: patch-CVE-2012-0841-aa,v 1.1.2.2 2012/03/12 18:06:49 spz Exp $
+
+patch 8973d58b7498fa5100a876815476b81fd1a2412a
+
+--- dict.c.orig 2010-10-12 06:25:31.000000000 +0000
++++ dict.c
+@@ -2,7 +2,7 @@
+ * dict.c: dictionary of reusable strings, just used to avoid allocation
+ * and freeing operations.
+ *
+- * Copyright (C) 2003 Daniel Veillard.
++ * Copyright (C) 2003-2012 Daniel Veillard.
+ *
+ * Permission to use, copy, modify, and distribute this software for any
+ * purpose with or without fee is hereby granted, provided that the above
+@@ -19,6 +19,28 @@
+ #define IN_LIBXML
+ #include "libxml.h"
+
++#ifdef HAVE_STDLIB_H
++#include <stdlib.h>
++#endif
++#ifdef HAVE_TIME_H
++#include <time.h>
++#endif
++
++/*
++ * Following http://www.ocert.org/advisories/ocert-2011-003.html
++ * it seems that having hash randomization might be a good idea
++ * when using XML with untrusted data
++ * Note1: that it works correctly only if compiled with WITH_BIG_KEY
++ * which is the default.
++ * Note2: the fast function used for a small dict won't protect very
++ * well but since the attack is based on growing a very big hash
++ * list we will use the BigKey algo as soon as the hash size grows
++ * over MIN_DICT_SIZE so this actually works
++ */
++#if defined(HAVE_RAND) && defined(HAVE_SRAND) && defined(HAVE_TIME)
++#define DICT_RANDOMIZATION
++#endif
++
+ #include <string.h>
+ #ifdef HAVE_STDINT_H
+ #include <stdint.h>
+@@ -44,23 +66,23 @@ typedef unsigned __int32 uint32_t;
+ #define WITH_BIG_KEY
+
+ #ifdef WITH_BIG_KEY
+-#define xmlDictComputeKey(dict, name, len) \
+- (((dict)->size == MIN_DICT_SIZE) ? \
+- xmlDictComputeFastKey(name, len) : \
+- xmlDictComputeBigKey(name, len))
+-
+-#define xmlDictComputeQKey(dict, prefix, plen, name, len) \
+- (((prefix) == NULL) ? \
+- (xmlDictComputeKey(dict, name, len)) : \
+- (((dict)->size == MIN_DICT_SIZE) ? \
+- xmlDictComputeFastQKey(prefix, plen, name, len) : \
+- xmlDictComputeBigQKey(prefix, plen, name, len)))
++#define xmlDictComputeKey(dict, name, len) \
++ (((dict)->size == MIN_DICT_SIZE) ? \
++ xmlDictComputeFastKey(name, len, (dict)->seed) : \
++ xmlDictComputeBigKey(name, len, (dict)->seed))
++
++#define xmlDictComputeQKey(dict, prefix, plen, name, len) \
++ (((prefix) == NULL) ? \
++ (xmlDictComputeKey(dict, name, len)) : \
++ (((dict)->size == MIN_DICT_SIZE) ? \
++ xmlDictComputeFastQKey(prefix, plen, name, len, (dict)->seed) : \
++ xmlDictComputeBigQKey(prefix, plen, name, len, (dict)->seed)))
+
+ #else /* !WITH_BIG_KEY */
+-#define xmlDictComputeKey(dict, name, len) \
+- xmlDictComputeFastKey(name, len)
+-#define xmlDictComputeQKey(dict, prefix, plen, name, len) \
+- xmlDictComputeFastQKey(prefix, plen, name, len)
++#define xmlDictComputeKey(dict, name, len) \
++ xmlDictComputeFastKey(name, len, (dict)->seed)
++#define xmlDictComputeQKey(dict, prefix, plen, name, len) \
++ xmlDictComputeFastQKey(prefix, plen, name, len, (dict)->seed)
+ #endif /* WITH_BIG_KEY */
+
+ /*
+@@ -98,6 +120,8 @@ struct _xmlDict {
+ xmlDictStringsPtr strings;
+
+ struct _xmlDict *subdict;
++ /* used for randomization */
++ int seed;
+ };
+
+ /*
+@@ -125,6 +149,9 @@ static int xmlInitializeDict(void) {
+ if ((xmlDictMutex = xmlNewRMutex()) == NULL)
+ return(0);
+
++#ifdef DICT_RANDOMIZATION
++ srand(time(NULL));
++#endif
+ xmlDictInitialized = 1;
+ return(1);
+ }
+@@ -277,13 +304,13 @@ found_pool:
+ */
+
+ static uint32_t
+-xmlDictComputeBigKey(const xmlChar* data, int namelen) {
++xmlDictComputeBigKey(const xmlChar* data, int namelen, int seed) {
+ uint32_t hash;
+ int i;
+
+ if (namelen <= 0 || data == NULL) return(0);
+
+- hash = 0;
++ hash = seed;
+
+ for (i = 0;i < namelen; i++) {
+ hash += data[i];
+@@ -310,12 +337,12 @@ xmlDictComputeBigKey(const xmlChar* data
+ */
+ static unsigned long
+ xmlDictComputeBigQKey(const xmlChar *prefix, int plen,
+- const xmlChar *name, int len)
++ const xmlChar *name, int len, int seed)
+ {
+ uint32_t hash;
+ int i;
+
+- hash = 0;
++ hash = seed;
+
+ for (i = 0;i < plen; i++) {
+ hash += prefix[i];
+@@ -346,8 +373,8 @@ xmlDictComputeBigQKey(const xmlChar *pre
+ * for low hash table fill.
+ */
+ static unsigned long
+-xmlDictComputeFastKey(const xmlChar *name, int namelen) {
+- unsigned long value = 0L;
++xmlDictComputeFastKey(const xmlChar *name, int namelen, int seed) {
++ unsigned long value = seed;
+
+ if (name == NULL) return(0);
+ value = *name;
+@@ -381,9 +408,9 @@ xmlDictComputeFastKey(const xmlChar *nam
+ */
+ static unsigned long
+ xmlDictComputeFastQKey(const xmlChar *prefix, int plen,
+- const xmlChar *name, int len)
++ const xmlChar *name, int len, int seed)
+ {
+- unsigned long value = 0L;
++ unsigned long value = (unsigned long) seed;
+
+ if (plen == 0)
+ value += 30 * (unsigned long) ':';
+@@ -460,6 +487,11 @@ xmlDictCreate(void) {
+ dict->subdict = NULL;
+ if (dict->dict) {
+ memset(dict->dict, 0, MIN_DICT_SIZE * sizeof(xmlDictEntry));
++#ifdef DICT_RANDOMIZATION
++ dict->seed = rand();
++#else
++ dict->seed = 0;
++#endif
+ return(dict);
+ }
+ xmlFree(dict);
+@@ -486,6 +518,7 @@ xmlDictCreateSub(xmlDictPtr sub) {
+ #ifdef DICT_DEBUG_PATTERNS
+ fprintf(stderr, "R");
+ #endif
++ dict->seed = sub->seed;
+ dict->subdict = sub;
+ xmlDictReference(dict->subdict);
+ }
diff --git a/textproc/libxml2/patches/patch-CVE-2012-0841-ab b/textproc/libxml2/patches/patch-CVE-2012-0841-ab
new file mode 100644
index 00000000000..e55e354f7af
--- /dev/null
+++ b/textproc/libxml2/patches/patch-CVE-2012-0841-ab
@@ -0,0 +1,93 @@
+$NetBSD: patch-CVE-2012-0841-ab,v 1.1.2.2 2012/03/12 18:06:49 spz Exp $
+
+patch 8973d58b7498fa5100a876815476b81fd1a2412a
+
+--- hash.c.orig 2010-10-12 06:25:32.000000000 +0000
++++ hash.c
+@@ -3,7 +3,7 @@
+ *
+ * Reference: Your favorite introductory book on algorithms
+ *
+- * Copyright (C) 2000 Bjorn Reese and Daniel Veillard.
++ * Copyright (C) 2000,2012 Bjorn Reese and Daniel Veillard.
+ *
+ * Permission to use, copy, modify, and distribute this software for any
+ * purpose with or without fee is hereby granted, provided that the above
+@@ -21,6 +21,22 @@
+ #include "libxml.h"
+
+ #include <string.h>
++#ifdef HAVE_STDLIB_H
++#include <stdlib.h>
++#endif
++#ifdef HAVE_TIME_H
++#include <time.h>
++#endif
++
++/*
++ * Following http://www.ocert.org/advisories/ocert-2011-003.html
++ * it seems that having hash randomization might be a good idea
++ * when using XML with untrusted data
++ */
++#if defined(HAVE_RAND) && defined(HAVE_SRAND) && defined(HAVE_TIME)
++#define HASH_RANDOMIZATION
++#endif
++
+ #include <libxml/parser.h>
+ #include <libxml/hash.h>
+ #include <libxml/xmlmemory.h>
+@@ -31,6 +47,10 @@
+
+ /* #define DEBUG_GROW */
+
++#ifdef HASH_RANDOMIZATION
++static int hash_initialized = 0;
++#endif
++
+ /*
+ * A single entry in the hash table
+ */
+@@ -53,6 +73,9 @@ struct _xmlHashTable {
+ int size;
+ int nbElems;
+ xmlDictPtr dict;
++#ifdef HASH_RANDOMIZATION
++ int random_seed;
++#endif
+ };
+
+ /*
+@@ -65,6 +88,9 @@ xmlHashComputeKey(xmlHashTablePtr table,
+ unsigned long value = 0L;
+ char ch;
+
++#ifdef HASH_RANDOMIZATION
++ value = table->random_seed;
++#endif
+ if (name != NULL) {
+ value += 30 * (*name);
+ while ((ch = *name++) != 0) {
+@@ -92,6 +118,9 @@ xmlHashComputeQKey(xmlHashTablePtr table
+ unsigned long value = 0L;
+ char ch;
+
++#ifdef HASH_RANDOMIZATION
++ value = table->random_seed;
++#endif
+ if (prefix != NULL)
+ value += 30 * (*prefix);
+ else
+@@ -156,6 +185,13 @@ xmlHashCreate(int size) {
+ table->table = xmlMalloc(size * sizeof(xmlHashEntry));
+ if (table->table) {
+ memset(table->table, 0, size * sizeof(xmlHashEntry));
++#ifdef HASH_RANDOMIZATION
++ if (!hash_initialized) {
++ srand(time(NULL));
++ hash_initialized = 1;
++ }
++ table->random_seed = rand();
++#endif
+ return(table);
+ }
+ xmlFree(table);
diff --git a/textproc/libxml2/patches/patch-CVE-2012-0841-ac b/textproc/libxml2/patches/patch-CVE-2012-0841-ac
new file mode 100644
index 00000000000..0eba0b4b27b
--- /dev/null
+++ b/textproc/libxml2/patches/patch-CVE-2012-0841-ac
@@ -0,0 +1,15 @@
+$NetBSD: patch-CVE-2012-0841-ac,v 1.1.2.2 2012/03/12 18:06:50 spz Exp $
+
+avoid to modify "configure", to keep the patch simple
+
+--- config.h.in.orig 2010-11-04 17:28:15.000000000 +0000
++++ config.h.in
+@@ -309,3 +309,8 @@
+
+ /* Win32 Std C name mangling work-around */
+ #undef vsnprintf
++
++/* XXX assume that POSIX functions are present */
++#define HAVE_RAND 1
++#define HAVE_SRAND 1
++#define HAVE_TIME 1
diff --git a/textproc/libxml2/patches/patch-aa b/textproc/libxml2/patches/patch-aa
index 7f31fcf5497..bbde8067319 100644
--- a/textproc/libxml2/patches/patch-aa
+++ b/textproc/libxml2/patches/patch-aa
@@ -1,8 +1,17 @@
-$NetBSD: patch-aa,v 1.23 2008/09/06 14:58:34 wiz Exp $
+$NetBSD: patch-aa,v 1.23.30.1 2012/03/12 18:06:50 spz Exp $
---- Makefile.in.orig 2008-08-30 16:50:47.000000000 +0200
+--- Makefile.in.orig 2010-11-04 17:28:16.000000000 +0000
+++ Makefile.in
-@@ -657,7 +657,7 @@ pkgconfig_DATA = libxml-2.0.pc
+@@ -569,7 +569,7 @@ DIST_SUBDIRS = include . doc example pyt
+ INCLUDES = -I$(top_builddir)/include -I@srcdir@/include @THREAD_CFLAGS@ @Z_CFLAGS@
+ bin_SCRIPTS = xml2-config
+ lib_LTLIBRARIES = libxml2.la
+-libxml2_la_LIBADD = @THREAD_LIBS@ @Z_LIBS@ $(ICONV_LIBS) @M_LIBS@ @WIN32_EXTRA_LIBADD@
++libxml2_la_LIBADD = @Z_LIBS@ $(ICONV_LIBS) @M_LIBS@ @WIN32_EXTRA_LIBADD@
+ @USE_VERSION_SCRIPT_FALSE@LIBXML2_VERSION_SCRIPT =
+ @USE_VERSION_SCRIPT_TRUE@LIBXML2_VERSION_SCRIPT = $(VERSION_SCRIPT_FLAGS)$(srcdir)/libxml2.syms
+ libxml2_la_LDFLAGS = @CYGWIN_EXTRA_LDFLAGS@ @WIN32_EXTRA_LDFLAGS@ \
+@@ -714,7 +714,7 @@ pkgconfig_DATA = libxml-2.0.pc
#
BASE_DIR = $(datadir)/doc
DOC_MODULE = libxml2-$(VERSION)
diff --git a/textproc/libxml2/patches/patch-ab b/textproc/libxml2/patches/patch-ab
index 3bc264f9330..c72569240de 100644
--- a/textproc/libxml2/patches/patch-ab
+++ b/textproc/libxml2/patches/patch-ab
@@ -1,4 +1,4 @@
-$NetBSD: patch-ab,v 1.21 2010/11/26 13:43:25 drochner Exp $
+$NetBSD: patch-ab,v 1.21.10.1 2012/03/12 18:06:50 spz Exp $
--- configure.orig 2010-11-04 17:28:14.000000000 +0000
+++ configure
@@ -20,6 +20,32 @@ $NetBSD: patch-ab,v 1.21 2010/11/26 13:43:25 drochner Exp $
XML_INCLUDEDIR='-I${includedir}/libxml2'
XML_CFLAGS=""
+@@ -13815,13 +13815,13 @@ else
+ if test "$with_threads" = "pthread" || test "$with_threads" = "" || test "$with_threads" = "yes" ; then
+ ac_fn_c_check_header_mongrel "$LINENO" "pthread.h" "ac_cv_header_pthread_h" "$ac_includes_default"
+ if test "x$ac_cv_header_pthread_h" = x""yes; then :
+- { $as_echo "$as_me:${as_lineno-$LINENO}: checking for pthread_join in -lpthread" >&5
+-$as_echo_n "checking for pthread_join in -lpthread... " >&6; }
++ { $as_echo "$as_me:${as_lineno-$LINENO}: checking for pthread_join in ${PTHREAD_LDFLAGS} ${PTHREAD_LIBS}" >&5
++$as_echo_n "checking for pthread_join in ${PTHREAD_LDFLAGS} ${PTHREAD_LIBS}... " >&6; }
+ if test "${ac_cv_lib_pthread_pthread_join+set}" = set; then :
+ $as_echo_n "(cached) " >&6
+ else
+ ac_check_lib_save_LIBS=$LIBS
+-LIBS="-lpthread $LIBS"
++LIBS="${PTHREAD_LDFLAGS} ${PTHREAD_LIBS} $LIBS"
+ cat confdefs.h - <<_ACEOF >conftest.$ac_ext
+ /* end confdefs.h. */
+
+@@ -13853,7 +13853,7 @@ fi
+ $as_echo "$ac_cv_lib_pthread_pthread_join" >&6; }
+ if test "x$ac_cv_lib_pthread_pthread_join" = x""yes; then :
+
+- THREAD_LIBS="-lpthread"
++ THREAD_LIBS="${PTHREAD_LDFLAGS} ${PTHREAD_LIBS}"
+
+ $as_echo "#define HAVE_LIBPTHREAD /**/" >>confdefs.h
+
@@ -14582,10 +14582,10 @@ $as_echo "#define snprintf _snprintf" >>
$as_echo "#define vsnprintf _vsnprintf" >>confdefs.h
diff --git a/textproc/libxml2/patches/patch-am b/textproc/libxml2/patches/patch-am
new file mode 100644
index 00000000000..0b7e9a135fe
--- /dev/null
+++ b/textproc/libxml2/patches/patch-am
@@ -0,0 +1,13 @@
+$NetBSD: patch-am,v 1.1.2.2 2012/03/12 18:06:50 spz Exp $
+
+--- runtest.c.orig 2010-10-12 06:25:32.000000000 +0000
++++ runtest.c
+@@ -3936,7 +3936,7 @@ thread_specific_data(void *private_data)
+ return ((void *) Okay);
+ }
+
+-#if defined(linux) || defined(__sun) || defined(__APPLE_CC__)
++#if defined(linux) || defined(__sun) || defined(__APPLE_CC__) || defined(__NetBSD__)
+
+ #include <pthread.h>
+