I made it a team upload, given that wpa is in debian/ namespace and will push the git commits/tag once the package is accepted.
Andrew, if you disagree with the upload, please holler so I can cancel the upload (I obviously won't push my changes in this case).
Regards, Michael
diff -Nru wpa-2.10/debian/.gitignore wpa-2.10/debian/.gitignore --- wpa-2.10/debian/.gitignore 2024-08-06 22:08:38.000000000 +0200 +++ wpa-2.10/debian/.gitignore 1970-01-01 01:00:00.000000000 +0100 @@ -1,11 +0,0 @@ -*.debhelper -*.substvars -.debhelper/ -debhelper-build-stamp -eapoltest/ -files -hostapd/ -libwpa-client-dev/ -wpagui/ -wpasupplicant-udeb/ -wpasupplicant/ diff -Nru wpa-2.10/debian/changelog wpa-2.10/debian/changelog --- wpa-2.10/debian/changelog 2024-08-06 22:08:38.000000000 +0200 +++ wpa-2.10/debian/changelog 2025-03-21 19:52:45.000000000 +0100 @@ -1,3 +1,11 @@ +wpa (2:2.10-23) unstable; urgency=medium + + * Team upload. + * Send CTRL-EVENT-SIGNAL-CHANGE message to control interfaces only + (Closes: #1101013) + + -- Michael Biebl <bi...@debian.org> Fri, 21 Mar 2025 19:52:45 +0100 + wpa (2:2.10-22) unstable; urgency=medium * Only load libraries from trusted path (CVE-2024-5290, LP: #2067613). diff -Nru wpa-2.10/debian/patches/series wpa-2.10/debian/patches/series --- wpa-2.10/debian/patches/series 2024-08-06 22:08:38.000000000 +0200 +++ wpa-2.10/debian/patches/series 2025-03-21 19:52:45.000000000 +0100 @@ -16,3 +16,4 @@ upstream-fixes/0016-Override-ieee80211w-from-pmf-for-AP-mode-in-wpa_supp.patch 0017-CVE-2023-52160-PEAP-client-Update-Phase-2-authentica.patch CVE-2024-5290-lib_engine_trusted_path.patch +upstream-fixes/0019-Send-CTRL-EVENT-SIGNAL-CHANGE-message-to-control-int.patch diff -Nru wpa-2.10/debian/patches/upstream-fixes/0019-Send-CTRL-EVENT-SIGNAL-CHANGE-message-to-control-int.patch wpa-2.10/debian/patches/upstream-fixes/0019-Send-CTRL-EVENT-SIGNAL-CHANGE-message-to-control-int.patch --- wpa-2.10/debian/patches/upstream-fixes/0019-Send-CTRL-EVENT-SIGNAL-CHANGE-message-to-control-int.patch 1970-01-01 01:00:00.000000000 +0100 +++ wpa-2.10/debian/patches/upstream-fixes/0019-Send-CTRL-EVENT-SIGNAL-CHANGE-message-to-control-int.patch 2025-03-21 19:52:45.000000000 +0100 @@ -0,0 +1,44 @@ +From: Kan-Ru Chen <ka...@kanru.info> +Date: Mon, 23 Dec 2024 08:42:33 +0900 +Subject: Send CTRL-EVENT-SIGNAL-CHANGE message to control interfaces only + +The default logging level for the CTRL-EVENT-SIGNAL-CHANGE message +may be repeated many times and fill the log file or journal. + +For example https://bugzilla.redhat.com/show_bug.cgi?id=2309148 and +the first few results from searching CTRL-EVENT-SIGNAL-CHANGE on the +web contain various complaints and workarounds. + +Change the logging method to wpa_msg_ctrl to avoid sending frequent +messages to the syslog but still allow the message to be consumed by +control interface monitors. + +Signed-off-by: Kan-Ru Chen <ka...@kanru.info> +(cherry picked from commit c330b5820eefa8e703dbce7278c2a62d9c69166a) +--- + wpa_supplicant/events.c | 12 ++++++------ + 1 file changed, 6 insertions(+), 6 deletions(-) + +diff --git a/wpa_supplicant/events.c b/wpa_supplicant/events.c +index f55e184..5d2c62b 100644 +--- a/wpa_supplicant/events.c ++++ b/wpa_supplicant/events.c +@@ -5447,12 +5447,12 @@ void wpa_supplicant_event(void *ctx, enum wpa_event_type event, + data->eapol_rx.data_len); + break; + case EVENT_SIGNAL_CHANGE: +- wpa_msg(wpa_s, MSG_INFO, WPA_EVENT_SIGNAL_CHANGE +- "above=%d signal=%d noise=%d txrate=%d", +- data->signal_change.above_threshold, +- data->signal_change.current_signal, +- data->signal_change.current_noise, +- data->signal_change.current_txrate); ++ wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_SIGNAL_CHANGE ++ "above=%d signal=%d noise=%d txrate=%d", ++ data->signal_change.above_threshold, ++ data->signal_change.current_signal, ++ data->signal_change.current_noise, ++ data->signal_change.current_txrate); + wpa_bss_update_level(wpa_s->current_bss, + data->signal_change.current_signal); + bgscan_notify_signal_change(
OpenPGP_signature.asc
Description: OpenPGP digital signature