Ops One AG platform status and maintenance announcements. Times are indicated in local Swiss time. https://opsone.ch/.
All systems are operational
Scheduled Maintenance
Managed Server 9: glibc security update

We will update the following packages to the latest version:

  • libc6-dbg/stable-security 2.36-9+deb12u6 amd64 [upgradable from: 2.36-9+deb12u4]
  • libc6-dev/stable-security 2.36-9+deb12u6 amd64 [upgradable from: 2.36-9+deb12u4]
  • libc6/stable-security 2.36-9+deb12u6 amd64 [upgradable from: 2.36-9+deb12u4]
  • libc-bin/stable-security 2.36-9+deb12u6 amd64 [upgradable from: 2.36-9+deb12u4]
  • libc-dev-bin/stable-security 2.36-9+deb12u6 amd64 [upgradable from: 2.36-9+deb12u4]
  • libc-devtools/stable-security 2.36-9+deb12u6 amd64 [upgradable from: 2.36-9+deb12u4]
  • libc-l10n/stable-security 2.36-9+deb12u6 all [upgradable from: 2.36-9+deb12u4]

To load the new library version, all affected servers will reboot after the package was updated.

Start maintenance window: 25/04/2024 23:00
Stop maintenance window: 26/04/2024 02:00

Managed Server 8: glibc security update

We will update the following packages to the latest version:

  • libc-bin/oldstable-security 2.31-13+deb11u9 amd64 [upgradable from: 2.31-13+deb11u8]
  • libc-dev-bin/oldstable-security 2.31-13+deb11u9 amd64 [upgradable from: 2.31-13+deb11u8]
  • libc-devtools/oldstable-security 2.31-13+deb11u9 amd64 [upgradable from: 2.31-13+deb11u8]
  • libc-l10n/oldstable-security 2.31-13+deb11u9 all [upgradable from: 2.31-13+deb11u8]
  • libc6-dbg/oldstable-security 2.31-13+deb11u9 amd64 [upgradable from: 2.31-13+deb11u8]
  • libc6-dev/oldstable-security 2.31-13+deb11u9 amd64 [upgradable from: 2.31-13+deb11u8]
  • libc6/oldstable-security 2.31-13+deb11u9 amd64 [upgradable from: 2.31-13+deb11u8]

To load the new library version, all affected servers will reboot after the package was updated.

Start maintenance window: 25/04/2024 23:00
Stop maintenance window: 26/04/2024 02:00

Debian Updates: Managed Server 9

We will update the following packages to the latest version.

  • docker-ce/bookworm 5:26.1.0-1~debian.12~bookworm amd64 [upgradable from: 5:26.0.2-1~debian.12~bookworm]
  • docker-ce-cli/bookworm 5:26.1.0-1~debian.12~bookworm amd64 [upgradable from: 5:26.0.2-1~debian.12~bookworm]
  • docker-ce-rootless-extras/bookworm 5:26.1.0-1~debian.12~bookworm amd64 [upgradable from: 5:26.0.2-1~debian.12~bookworm]
  • locales/stable-security 2.36-9+deb12u6 all [upgradable from: 2.36-9+deb12u4]
  • openjdk-17-jre-headless/stable-security 17.0.11+9-1~deb12u1 amd64 [upgradable from: 17.0.10+7-1~deb12u1]
  • openjdk-17-jre/stable-security 17.0.11+9-1~deb12u1 amd64 [upgradable from: 17.0.10+7-1~deb12u1]

Start maintenance window: 29/04/2024 23:00
Stop maintenance window: 30/04/2024 02:00

Debian Updates: Managed Server 8

We will update the following packages to the latest version.

  • docker-ce-cli/bullseye 5:26.1.0-1~debian.11~bullseye amd64 [upgradable from: 5:26.0.2-1~debian.11~bullseye]
  • docker-ce-rootless-extras/bullseye 5:26.1.0-1~debian.11~bullseye amd64 [upgradable from: 5:26.0.2-1~debian.11~bullseye]
  • docker-ce/bullseye 5:26.1.0-1~debian.11~bullseye amd64 [upgradable from: 5:26.0.2-1~debian.11~bullseye]
  • locales/oldstable-security 2.31-13+deb11u9 all [upgradable from: 2.31-13+deb11u8]

Start maintenance window: 29/04/2024 23:00
Stop maintenance window: 30/04/2024 02:00

Debian Updates: Managed Server 7

We will update the following packages to the latest version.

  • docker-ce/buster 5:26.1.0-1~debian.10~buster amd64 [upgradable from: 5:26.0.2-1~debian.10~buster]
  • docker-ce-cli/buster 5:26.1.0-1~debian.10~buster amd64 [upgradable from: 5:26.0.2-1~debian.10~buster]
  • docker-ce-rootless-extras/buster 5:26.1.0-1~debian.10~buster amd64 [upgradable from: 5:26.0.2-1~debian.10~buster]

Start maintenance window: 29/04/2024 23:00
Stop maintenance window: 30/04/2024 02:00

Past Incidents

Friday 17th November 2017

No incidents reported

Thursday 16th November 2017

No incidents reported

Wednesday 15th November 2017

Debian Updates, scheduled 6 years ago

Package : graphicsmagick
Version : 1.3.16-1.1+deb7u15
CVE ID : CVE-2017-13134 CVE-2017-16547
Debian Bug : 881524

Security vulnerabilities have been identified in graphicsmagick, a collection of image processing utilities and libraries.

CVE-2017-13134

Graphicsmagick was vulnerable to a heap-based buffer over-read and
denial of service via a crafted SFW file.

CVE-2017-16547

Graphicsmagick was vulnerable to a remote denial of service
(application crash) or possible unspecified other impact via a
crafted file resulting from a defective memory allocation.

Tuesday 14th November 2017

No incidents reported

Monday 13th November 2017

No incidents reported

Sunday 12th November 2017

No incidents reported

Saturday 11th November 2017

No incidents reported