hostapd before 2.6 does not prevent use of the low-quality PRNG that is reached by an os_random() function call.
In wpa_supplicant and hostapd 2.9, forging attacks may occur because AlgorithmIdentifier parameters are mishandled in tls/pkcs1.c and tls/x509v3.c.