Mandrake Security Advisory MDVSA-2009:089 (opensc)

The remote host is missing an update to opensc announced via advisory MDVSA-2009:089.
To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
OpenSC before 0.11.7 allows physically proximate attackers to bypass intended PIN requirements and read private data objects via a (1) low level APDU command or (2) debugging tool, as demonstrated by reading the 4601 or 4701 file with the opensc-explorer or opensc-tool program. The updated packages fix the issue. Affected: 2008.0, 2008.1, 2009.0, Corporate 4.0