Ops One AG platform status and maintenance announcements. Times are indicated in local Swiss time. https://opsone.ch/.
All systems are operational
Scheduled Maintenance
Managed Server 10: OpenSSH Security Configuration

For several years, we have followed the OpenSSH recommendations published by Mozilla to ensure a secure and reliable SSH environment. As Mozilla has discontinued updates to these guidelines, we have decided to align our configuration with the latest recommendations from OpenSSH and Debian. This change brings our setup in line with current best practices and ensures continued security and compatibility. The update affects the Ciphers, MACs, and KexAlgorithms used in our OpenSSH server configuration.

We do not expect any issues for our customers. However, if you experience any unexpected behavior, please let us know. We are happy to adjust the configuration for individual servers as needed.

Start maintenance window: 24/11/2025 09:00
Stop maintenance window: 24/11/2025 12:00

Update Collabora 25.04.7.2.1

We will update Collabora to version 25.04.7.2.1.

Reference: #1599

Start maintenance window: 24/11/2025 23:00
Stop maintenance window: 25/11/2025 02:00

LimeSurvey 6.15.23

We will update LimeSurvey to version 6.15.23.

Reference: #67

Start maintenance window: 24/11/2025 23:00
Stop maintenance window: 25/11/2025 02:00

Sentry 25.11.0

We will update Sentry to version 25.11.0.

Start maintenance window: 24/11/2025 23:00
Stop maintenance window: 25/11/2025 02:00

Past Incidents

Saturday 20th January 2018

No incidents reported

Friday 19th January 2018

No incidents reported

Thursday 18th January 2018

Managed Server Version 5: Enhance Lets Encrypt Debugging

From time to time, you will encounter problems while changing website configurations with enabled Let's Encrypt certificated. Most of the time, this is related to a failed validation request, for example because a certain server name does not point to our host already.

By now, it was pretty hard to reach the debugging output of our Let's Encrypt client, and it was not possible at all to enforce a run from a shell account. With this change, we add the letsencrypt-renew shortcut which will allow you to enforce renewal and immediately see the output should a problem arise.

For details, please see the corresponding new part in our documentation.

Wednesday 17th January 2018

No incidents reported

Tuesday 16th January 2018

Managed Server Version 4: graphicsmagick and libgraphicsmagick3 update, scheduled 7 years ago

Package: graphicsmagick
Version: 1.3.16-1.1+deb7u17
CVE ID: CVE-2018-5685
Debian Bug: 887158

  • libgraphicsmagick3 1.3.16-1.1+deb7u16 was updated to version libgraphicsmagick3_1.3.16-1.1+deb7u17_amd64.deb.
  • graphicsmagick 1.3.16-1.1+deb7u16 was updated to version graphicsmagick_1.3.16-1.1+deb7u17_amd64.deb.
A vulnerability has been discovered in GraphicsMagick, a collection of
image processing tools, which may result in a denial of service.

CVE-2018-5685
    An infinite loop and application hang has been discovered in the
    ReadBMPImage function (coders/bmp.c). Remote attackers could
    leverage this vulnerability to cause a denial of service via an
    image file with a crafted bit-field mask value.
Managed Server Version 5: gdk-pixbuf update, scheduled 7 years ago

Package: gdk-pixbuf
CVE ID: CVE-2017-1000422

  • libgdk-pixbuf2.0-0 2.31.1-2+deb8u6 was updated to version 2.31.1-2+deb8u7.
  • libgdk-pixbuf2.0-common 2.31.1-2+deb8u6 was updated to version 2.31.1-2+deb8u7.
It was discovered that multiple integer overflows in the GIF image loader
in the GDK Pixbuf library may result in denial of service and potentially
the execution of arbitrary code if a malformed image file is opened.

Monday 15th January 2018

Managed Server Version 5: libxml2 update, scheduled 7 years ago

Package: libxml2
CVE ID: CVE-2017-15412
Debian Bug: 883790

libxml2 2.9.1+dfsg1-5+deb8u5 was updated to version 2.9.1+dfsg1-5+deb8u6.

Nick Wellnhofer discovered that certain function calls inside XPath
predicates can lead to use-after-free and double-free errors when
executed by libxml2's XPath engine via an XSLT transformation.

Sunday 14th January 2018

No incidents reported