Mandrake Security Advisory MDVSA-2009:089 (opensc)

Summary
The remote host is missing an update to opensc announced via advisory MDVSA-2009:089.
Solution
To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:089
Insight
OpenSC before 0.11.7 allows physically proximate attackers to bypass intended PIN requirements and read private data objects via a (1) low level APDU command or (2) debugging tool, as demonstrated by reading the 4601 or 4701 file with the opensc-explorer or opensc-tool program. The updated packages fix the issue. Affected: 2008.0, 2008.1, 2009.0, Corporate 4.0