I've uploaded the attached debdiff to DELAYED/14 after verifying it fixes the issue for me.

I made it a team upload, given that wpa is in debian/ namespace and will push the git commits/tag once the package is accepted.

Andrew, if you disagree with the upload, please holler so I can cancel the upload (I obviously won't push my changes in this case).

Regards,
Michael
diff -Nru wpa-2.10/debian/.gitignore wpa-2.10/debian/.gitignore
--- wpa-2.10/debian/.gitignore  2024-08-06 22:08:38.000000000 +0200
+++ wpa-2.10/debian/.gitignore  1970-01-01 01:00:00.000000000 +0100
@@ -1,11 +0,0 @@
-*.debhelper
-*.substvars
-.debhelper/
-debhelper-build-stamp
-eapoltest/
-files
-hostapd/
-libwpa-client-dev/
-wpagui/
-wpasupplicant-udeb/
-wpasupplicant/
diff -Nru wpa-2.10/debian/changelog wpa-2.10/debian/changelog
--- wpa-2.10/debian/changelog   2024-08-06 22:08:38.000000000 +0200
+++ wpa-2.10/debian/changelog   2025-03-21 19:52:45.000000000 +0100
@@ -1,3 +1,11 @@
+wpa (2:2.10-23) unstable; urgency=medium
+
+  * Team upload.
+  * Send CTRL-EVENT-SIGNAL-CHANGE message to control interfaces only
+    (Closes: #1101013)
+
+ -- Michael Biebl <bi...@debian.org>  Fri, 21 Mar 2025 19:52:45 +0100
+
 wpa (2:2.10-22) unstable; urgency=medium
 
   * Only load libraries from trusted path (CVE-2024-5290, LP: #2067613).
diff -Nru wpa-2.10/debian/patches/series wpa-2.10/debian/patches/series
--- wpa-2.10/debian/patches/series      2024-08-06 22:08:38.000000000 +0200
+++ wpa-2.10/debian/patches/series      2025-03-21 19:52:45.000000000 +0100
@@ -16,3 +16,4 @@
 upstream-fixes/0016-Override-ieee80211w-from-pmf-for-AP-mode-in-wpa_supp.patch
 0017-CVE-2023-52160-PEAP-client-Update-Phase-2-authentica.patch
 CVE-2024-5290-lib_engine_trusted_path.patch
+upstream-fixes/0019-Send-CTRL-EVENT-SIGNAL-CHANGE-message-to-control-int.patch
diff -Nru 
wpa-2.10/debian/patches/upstream-fixes/0019-Send-CTRL-EVENT-SIGNAL-CHANGE-message-to-control-int.patch
 
wpa-2.10/debian/patches/upstream-fixes/0019-Send-CTRL-EVENT-SIGNAL-CHANGE-message-to-control-int.patch
--- 
wpa-2.10/debian/patches/upstream-fixes/0019-Send-CTRL-EVENT-SIGNAL-CHANGE-message-to-control-int.patch
      1970-01-01 01:00:00.000000000 +0100
+++ 
wpa-2.10/debian/patches/upstream-fixes/0019-Send-CTRL-EVENT-SIGNAL-CHANGE-message-to-control-int.patch
      2025-03-21 19:52:45.000000000 +0100
@@ -0,0 +1,44 @@
+From: Kan-Ru Chen <ka...@kanru.info>
+Date: Mon, 23 Dec 2024 08:42:33 +0900
+Subject: Send CTRL-EVENT-SIGNAL-CHANGE message to control interfaces only
+
+The default logging level for the CTRL-EVENT-SIGNAL-CHANGE message
+may be repeated many times and fill the log file or journal.
+
+For example https://bugzilla.redhat.com/show_bug.cgi?id=2309148 and
+the first few results from searching CTRL-EVENT-SIGNAL-CHANGE on the
+web contain various complaints and workarounds.
+
+Change the logging method to wpa_msg_ctrl to avoid sending frequent
+messages to the syslog but still allow the message to be consumed by
+control interface monitors.
+
+Signed-off-by: Kan-Ru Chen <ka...@kanru.info>
+(cherry picked from commit c330b5820eefa8e703dbce7278c2a62d9c69166a)
+---
+ wpa_supplicant/events.c | 12 ++++++------
+ 1 file changed, 6 insertions(+), 6 deletions(-)
+
+diff --git a/wpa_supplicant/events.c b/wpa_supplicant/events.c
+index f55e184..5d2c62b 100644
+--- a/wpa_supplicant/events.c
++++ b/wpa_supplicant/events.c
+@@ -5447,12 +5447,12 @@ void wpa_supplicant_event(void *ctx, enum 
wpa_event_type event,
+                                       data->eapol_rx.data_len);
+               break;
+       case EVENT_SIGNAL_CHANGE:
+-              wpa_msg(wpa_s, MSG_INFO, WPA_EVENT_SIGNAL_CHANGE
+-                      "above=%d signal=%d noise=%d txrate=%d",
+-                      data->signal_change.above_threshold,
+-                      data->signal_change.current_signal,
+-                      data->signal_change.current_noise,
+-                      data->signal_change.current_txrate);
++              wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_SIGNAL_CHANGE
++                           "above=%d signal=%d noise=%d txrate=%d",
++                           data->signal_change.above_threshold,
++                           data->signal_change.current_signal,
++                           data->signal_change.current_noise,
++                           data->signal_change.current_txrate);
+               wpa_bss_update_level(wpa_s->current_bss,
+                                    data->signal_change.current_signal);
+               bgscan_notify_signal_change(

Attachment: OpenPGP_signature.asc
Description: OpenPGP digital signature

Reply via email to