Security update for hostapd

This update for hostapd fixes the following issues:

- CVE-2021-30004: forging attacks may occur because AlgorithmIdentifier parameters are mishandled in tls/pkcs1.c and tls/x509v3.c (boo#1184348)
- CVE-2020-12695: UPnP SUBSCRIBE misbehavior in hostapd WPS AP (boo#1172700)
- CVE-2019-16275: AP mode PMF disconnection protection bypass (boo#1150934)

- added AppArmor profile (source apparmor-usr.sbin.hostapd)

Fixed bugs
bnc#1184348
VUL-0: CVE-2021-30004: wpa_supplicant, hostapd: forging attacks may occur because AlgorithmIdentifier parameters are mishandled in tls/pkcs1.c and tls/x509v3.c
bnc#1150934
VUL-1: CVE-2019-16275: wpa_supplicant,hostapd: AP mode PMF disconnection
bnc#1172700
VUL-0: CVE-2020-12695: hostapd: UPnP SUBSCRIBE misbehavior WPS AP
Selected Binaries
openSUSE Build Service is sponsored by