Fixed a potential security hole: The client has been able to include server side resources into the request by using external entities. Thanks to Johan Hôgre.
@maintainers: ping, need a bump or a mask.
This is a possible duplicate of bug 385811 for SAX Parser Information Exposure fixed in 3.1.3
+ 30 Aug 2014; Johann Schmitz <firstname.lastname@example.org> +xmlrpc-3.1.3.ebuild:
+ Version bump wrt bug #339400
Note that at least dev-java/jcs isn't compatible with the 3.1.3 version.
*** This bug has been marked as a duplicate of bug 385811 ***