Ops One AG platform status and maintenance announcements. Times are indicated in local Swiss time. https://opsone.ch/.
All systems are operational
Scheduled Maintenance
Update Nextcloud

We will update Nextcloud to version 32.0.6.

Reference: #860

Start maintenance window: 16/02/2026 23:00
Stop maintenance window: 17/02/2026 02:00

Managed Server 8: Debian Updates

We will update the following packages to the latest version.

  • hyperv-daemons/oldoldstable-security 5.10.249-1 amd64 [upgradable from: 5.10.247-1]
  • linux-compiler-gcc-10-x86/oldoldstable-security 5.10.249-1 amd64 [upgradable from: 5.10.247-1]
  • linux-headers-amd64/oldoldstable-security 5.10.249-1 amd64 [upgradable from: 5.10.247-1]
  • linux-image-amd64/oldoldstable-security 5.10.249-1 amd64 [upgradable from: 5.10.247-1]
  • linux-kbuild-5.10/oldoldstable-security 5.10.249-1 amd64 [upgradable from: 5.10.247-1]
  • linux-libc-dev/oldoldstable-security 5.10.249-1 amd64 [upgradable from: 5.10.247-1]
  • ops-php84/unknown 8.4.18-ops-104597 amd64 [upgradable from: 8.4.17-ops-99402]

Start maintenance window: 16/02/2026 23:00
Stop maintenance window: 17/02/2026 02:00

Managed Server 9: Debian Updates

We will update the following packages to the latest version.

  • chromium-common/oldstable-security 145.0.7632.75-1~deb12u1 amd64 [upgradable from: 144.0.7559.109-2~deb12u1]
  • chromium/oldstable-security 145.0.7632.75-1~deb12u1 amd64 [upgradable from: 144.0.7559.109-2~deb12u1]
  • chromium-sandbox/oldstable-security 145.0.7632.75-1~deb12u1 amd64 [upgradable from: 144.0.7559.109-2~deb12u1]
  • Connection closed by UNKNOWN port 65535
  • kex_exchange_identification: Connection closed by remote host
  • libnginx-mod-stream/oldstable-security 1.22.1-9+deb12u4 amd64 [upgradable from: 1.22.1-9+deb12u3]
  • libpq5/oldstable-security 15.16-0+deb12u1 amd64 [upgradable from: 15.15-0+deb12u1]
  • nginx-common/oldstable-security 1.22.1-9+deb12u4 all [upgradable from: 1.22.1-9+deb12u3]
  • nginx-full/oldstable-security 1.22.1-9+deb12u4 all [upgradable from: 1.22.1-9+deb12u3]
  • nginx/oldstable-security 1.22.1-9+deb12u4 amd64 [upgradable from: 1.22.1-9+deb12u3]
  • ops-php84/unknown 8.4.18-ops-104586 amd64 [upgradable from: 8.4.17-ops-99394]
  • ops-php85/unknown 8.5.3-ops-104599 amd64 [upgradable from: 8.5.2-ops-99403]

Start maintenance window: 16/02/2026 23:00
Stop maintenance window: 17/02/2026 02:00

Managed Server 10: Debian Updates

We will update the following packages to the latest version.

  • libpq5/stable-security 17.8-0+deb13u1 amd64 [upgradable from: 17.7-0+deb13u1]
  • ops-php84/unknown 8.4.18-ops-104589 amd64 [upgradable from: 8.4.17-ops-99395]
  • ops-php85/unknown 8.5.3-ops-104596 amd64 [upgradable from: 8.5.2-ops-99400]

Start maintenance window: 16/02/2026 23:00
Stop maintenance window: 17/02/2026 02:00

Past Incidents

Sunday 3rd December 2017

Network Maintanance, scheduled 8 years ago

We will conduct firmware and software updates on our core network infrastructure. Due to our redundant network design, we do not expect any loss of service.

Start maintenance window

Sunday, 03.12.2018, 05:00 CET

End maintenance window

Sunday, 03.12.2018, 09:00 CET

Update 09:02 CET

Maintenance was completed sucessfully

Thursday 30th November 2017

No incidents reported

Wednesday 29th November 2017

No incidents reported

Tuesday 28th November 2017

No incidents reported

Monday 27th November 2017

No incidents reported

Sunday 26th November 2017

No incidents reported

Saturday 25th November 2017

No incidents reported

Friday 24th November 2017

Debian Updates, scheduled 8 years ago

Package : libxml2
Version : 2.8.0+dfsg1-7+wheezy10
CVE ID : CVE-2017-5130

Debian Updates, scheduled 8 years ago

Package : openjdk-7
CVE ID : CVE-2017-10274 CVE-2017-10281 CVE-2017-10285 CVE-2017-10295
CVE-2017-10345 CVE-2017-10346 CVE-2017-10347 CVE-2017-10348
CVE-2017-10349 CVE-2017-10350 CVE-2017-10355 CVE-2017-10356
CVE-2017-10357 CVE-2017-10388

Several vulnerabilities have been discovered in OpenJDK, an implementation of the Oracle Java platform, resulting in impersonation of Kerberos services, denial of service, sandbox bypass or HTTP header injection.