Versions Packages Information History CVEs Badges Report

Packages for chrony

169 package(s) known

chrony

3.5.1 (3.5.1-r0)

chrony-dbg

3.5.1 (3.5.1-r0)

chrony-doc

3.5.1 (3.5.1-r0)

chrony-openrc

3.5.1 (3.5.1-r0)

chrony

3.3 Potentially vulnerable (3.3-r0)

chrony-doc

3.3 Potentially vulnerable (3.3-r0)

chrony

3.4 Potentially vulnerable (3.4-r2)

chrony-doc

3.4 Potentially vulnerable (3.4-r2)

chrony

3.5.1 (3.5.1-r0)

chrony-doc

3.5.1 (3.5.1-r0)

chrony-openrc

3.5.1 (3.5.1-r0)

chrony

3.5.1 (3.5.1-r0)

chrony-doc

3.5.1 (3.5.1-r0)

chrony-openrc

3.5.1 (3.5.1-r0)

chrony

3.5.1 (3.5.1-r0)

chrony-doc

3.5.1 (3.5.1-r0)

chrony-openrc

3.5.1 (3.5.1-r0)

chrony

4.0 (4.0-r1)

chrony-doc

4.0 (4.0-r1)

chrony-openrc

4.0 (4.0-r1)

chrony

3.5.1 (3.5.1-alt1)

chrony

4.0 (4.0-alt1)

chrony

3.2 Potentially vulnerable (3.2-1.25.amzn1)

chrony

3.2 Potentially vulnerable (3.2-1.26.amzn1)

chrony

3.2 Potentially vulnerable (3.2-1.27.amzn1)

chrony

3.2 Potentially vulnerable (3.2-1.amzn2.0.5)

chrony

3.2 Potentially vulnerable (3.2-1.amzn2.0.4)

chrony

3.2 Potentially vulnerable (3.2-1.amzn2.0.1)

chrony

3.2 Potentially vulnerable (3.2-1.amzn2.0.3)

chrony

3.5 Potentially vulnerable (3.5-2)
Arch
community

chrony

3.5.1 (3.5.1-1)

chrony

4.0

chrony

2.1.1 Potentially vulnerable (2.1.1-2.el6_8)

chrony

3.4 Potentially vulnerable (3.4-1.el7)
CentOS 8
BaseOS

chrony

3.3 Potentially vulnerable (3.3-3.el8)

chrony

3.5 Potentially vulnerable

chrony

4.0
Deepin
main

chrony

3.4 Potentially vulnerable (3.4-4+deb10u1+rebuild)

chrony

1.30 Potentially vulnerable (1.30-2+deb8u2)

chrony

3.0 Potentially vulnerable (3.0-4+deb9u2)

chrony

3.4 Potentially vulnerable (3.4-4+deb10u1)
Devuan 4.0 (Chimaera)
chimaera/main

chrony

4.0 (4.0-2)
Devuan Unstable
unstable/main

chrony

4.0 (4.0-2)

net/chrony

3.5.1
Entware
aarch64-k3.10

chrony

3.5 Potentially vulnerable (3.5-1a)
Entware
armv5sf-k3.2

chrony

3.5 Potentially vulnerable (3.5-1a)
Entware
armv7sf-k2.6

chrony

3.5 Potentially vulnerable (3.5-1a)
Entware
armv7sf-k3.2

chrony

3.5 Potentially vulnerable (3.5-1a)
Entware
mipselsf-k3.4

chrony

3.5 Potentially vulnerable (3.5-1a)
Entware
mipssf-k3.4

chrony

3.5 Potentially vulnerable (3.5-1a)
Entware
x64-k3.2

chrony

3.5 Potentially vulnerable (3.5-1a)
Exherbo
platypus

net/chrony

scm
Exherbo
platypus

net/chrony

4.0
Exherbo
platypus

net/chrony

3.5.1
Fedora 26
updates

chrony

3.2 Potentially vulnerable (3.2-1.fc26)
Fedora 26
release

chrony

3.1 Potentially vulnerable (3.1-4.fc26)
Fedora 27
updates

chrony

3.3 Potentially vulnerable (3.3-1.fc27)
Fedora 27
release

chrony

3.2 Potentially vulnerable (3.2-1.fc27)
Fedora 28
updates

chrony

3.4 Potentially vulnerable (3.4-1.fc28)
Fedora 28
release

chrony

3.3 Potentially vulnerable (3.3-1.fc28)
Fedora 29
release

chrony

3.4 Potentially vulnerable (3.4-1.fc29)
Fedora 30
updates

chrony

3.5 Potentially vulnerable (3.5-1.fc30)
Fedora 30
release

chrony

3.4 Potentially vulnerable (3.4-2.fc30)
Fedora 31
release

chrony

3.5 Potentially vulnerable (3.5-4.fc31)
Fedora 32
updates

chrony

3.5.1 (3.5.1-1.fc32)
Fedora 32
release

chrony

3.5 Potentially vulnerable (3.5-8.fc32)
Fedora 33
release

chrony

4.0 (4.0-0.9.pre4.fc33)
Fedora 33
updates

chrony

4.0 (4.0-1.fc33)

chrony

4.0 (4.0-1.fc34)

net/chrony

4.0
Funtoo 1.4
net-kit

net-misc/chrony

4.0

net-misc/chrony

9999

net-misc/chrony

4.0

net-misc/chrony

3.5.1 (3.5.1-r1)

chrony

4.0

chrony

4.0
Hyperbola
community

chrony

3.1 Potentially vulnerable (3.1-1.hyperbola2)

chrony

4.0 (4.0-2)

net-misc/chrony

9999

net-misc/chrony

4.0

net-misc/chrony

3.5.1 (3.5.1-r1)

net-misc/chrony

9999

net-misc/chrony

4.0

net-misc/chrony

3.5.1 (3.5.1-r1)

chrony

4.0

chrony

4.0
Mageia 6
core/release

chrony

2.4.1 Potentially vulnerable (2.4.1-1.mga6)
Mageia 7
core/release

chrony

3.4 Potentially vulnerable (3.4-2.mga7)
Mageia 7
core/updates

chrony

3.4 Potentially vulnerable (3.4-2.1.mga7)
Mageia Cauldron
core/release

chrony

4.0 (4.0-2.mga8)
Manjaro Stable
community

chrony

3.5.1 (3.5.1-1)
Manjaro Testing
community

chrony

3.5.1 (3.5.1-1)

chrony

3.5.1 (3.5.1-1)

chrony

3.5.1

chrony

4.0

chrony

3.4 Potentially vulnerable (3.4-3.oe1)
OpenMandriva 4.0
unsupported/release

chrony

3.4 Potentially vulnerable (3.4-2)
OpenMandriva 4.1
unsupported/release

chrony

3.5 Potentially vulnerable (3.5-1)
OpenMandriva Rolling
unsupported/release

chrony

3.5 Potentially vulnerable (3.5-1)
OpenMandriva Cooker
unsupported/release

chrony

3.5 Potentially vulnerable (3.5-1)

chrony

4.0

chrony

2.3 Potentially vulnerable (2.3-3.20)
openSUSE Leap 42.3
updates/oss

chrony

2.3 Potentially vulnerable (2.3-10.1)
openSUSE Leap 42.3
updates/oss

chrony

2.3 Potentially vulnerable (2.3-6.1)

chrony

3.2 Potentially vulnerable (3.2-lp150.5.5)
openSUSE Leap 15.0
updates/oss

chrony

3.2 Potentially vulnerable (3.2-lp150.11.2)
openSUSE Leap 15.0
updates/oss

chrony

3.2 Potentially vulnerable (3.2-lp150.8.1)

chrony

3.2 Potentially vulnerable (3.2-lp151.8.6)
openSUSE Leap 15.1
updates/oss

chrony

3.2 Potentially vulnerable (3.2-lp151.9.12.2)
openSUSE Leap 15.1
updates/oss

chrony

3.2 Potentially vulnerable (3.2-lp151.9.3.1)
openSUSE Leap 15.1
updates/oss

chrony

3.2 Potentially vulnerable (3.2-lp151.9.6.1)
openSUSE Leap 15.1
updates/oss

chrony

3.2 Potentially vulnerable (3.2-lp151.9.9.1)

chrony

3.2 Potentially vulnerable (3.2-lp152.12.1)
openSUSE Leap 15.2
updates/oss

chrony

3.2 Potentially vulnerable (3.2-lp152.13.3.2)

chrony

3.5.1 (3.5.1-2.1)

chrony

2.4.1 Potentially vulnerable (2.4.1-2)

chrony

3.3 Potentially vulnerable (3.3-3)

chrony

3.5.1 (3.5.1-1)
Parabola
community

chrony

3.5.1 (3.5.1-1)
Pardus
main

chrony

3.0 Potentially vulnerable (3.0-4+deb9u2)
Parrot
main

chrony

4.0 (4.0-2)

net/chrony

3.5.1

chrony

3.5 Potentially vulnerable (3.5-6)

chrony

3.4 Potentially vulnerable (3.4-4)

chrony

4.0 (4.0-2)

chrony

3.0 Potentially vulnerable (3.0-4+deb9u2)

chrony

3.4 Potentially vulnerable (3.4-4+deb10u1)

chrony

4.0 (4.0-2)
Rosa 2014.1
contrib/updates

chrony

1.31.2 Potentially vulnerable (1.31.2-1)
Rosa 2014.1
contrib/release

chrony

1.27 Potentially vulnerable (1.27-0.pre1git1ca844a.2)
Rosa 2016.1
contrib/release

chrony

1.31.2 Potentially vulnerable (1.31.2-3)
Rosa 2019.1
main/release

chrony

3.5.1 (3.5.1-1)
Rosa 2019.1
contrib/release

chrony

3.5 Potentially vulnerable (3.5-1)
Rosa Server 7.3
base/release

chrony

2.1.1 Potentially vulnerable (2.1.1-4.res7c)
Rosa Server 7.5
base/release

chrony

3.2 Potentially vulnerable (3.2-2.res7c)
Rosa Server 7.5
base/release

chrony

2.1.1 Potentially vulnerable (2.1.1-4.res7c)

chrony

3.4 Potentially vulnerable (3.4-1.el7)

chrony

3.2 Potentially vulnerable (3.2-2.el7)

chrony

3.1 Potentially vulnerable (3.1-2.el7)

chrony

2.1.1 Potentially vulnerable (2.1.1-1.el7)

chrony

2.1.1 Potentially vulnerable (2.1.1-3.el7)

chrony

2.1.1 Potentially vulnerable (2.1.1-4.el7_3)

chrony

1.29.1 Potentially vulnerable (1.29.1-1.el7)

chrony

1.29 Potentially vulnerable (1.29-2.el7)

network/chrony

3.5 Potentially vulnerable

chrony

4.0
Trisquel 6.0
toutatis/main

chrony

1.24 Potentially vulnerable (1.24-3.1ubuntu1)
Trisquel 7.0
belenos/main

chrony

1.29 Potentially vulnerable (1.29-1)
Trisquel 7.0
belenos-updates/main

chrony

1.29 Potentially vulnerable (1.29-1ubuntu0.1)
Trisquel 8.0
flidas/main

chrony

2.1.1 Potentially vulnerable (2.1.1-1)
Trisquel 8.0
flidas-updates/main

chrony

2.1.1 Potentially vulnerable (2.1.1-1ubuntu0.1)
Trisquel 9.0
etiona/main

chrony

3.2 Potentially vulnerable (3.2-4ubuntu4)
Trisquel 9.0
etiona-updates/main

chrony

3.2 Potentially vulnerable (3.2-4ubuntu4.5)
Ubuntu 12.04
precise/universe

chrony

1.24 Potentially vulnerable (1.24-3.1ubuntu1)

chrony

4.0 (4.0_2)