From $url: Fixed a potential security hole: The client has been able to include server side resources into the request by using external entities. Thanks to Johan Hôgre.
@maintainers: ping, need a bump or a mask.
This is a possible duplicate of bug 385811 for SAX Parser Information Exposure fixed in 3.1.3
+ 30 Aug 2014; Johann Schmitz <ercpe@gentoo.org> +xmlrpc-3.1.3.ebuild: + Version bump wrt bug #339400 Note that at least dev-java/jcs isn't compatible with the 3.1.3 version.
*** This bug has been marked as a duplicate of bug 385811 ***