Versions Packages Information History CVEs Related Badges Report

Packages for chrony

277 package(s) known

chrony

4.1 (4.1-r0)

chrony-dbg

4.1 (4.1-r0)

chrony-doc

4.1 (4.1-r0)

chrony-openrc

4.1 (4.1-r0)

chrony

4.2 (4.2-1.el8)

chrony

4.3 (4.3-1.el9)

chrony-doc

3.3 Potentially vulnerable (3.3-r0)

chrony-doc

3.4 Potentially vulnerable (3.4-r2)

chrony

3.5.1 (3.5.1-r0)

chrony-doc

3.5.1 (3.5.1-r0)

chrony-openrc

3.5.1 (3.5.1-r0)

chrony

3.5.1 (3.5.1-r0)

chrony-doc

3.5.1 (3.5.1-r0)

chrony-openrc

3.5.1 (3.5.1-r0)

chrony

3.5.1 (3.5.1-r0)

chrony-doc

3.5.1 (3.5.1-r0)

chrony-openrc

3.5.1 (3.5.1-r0)

chrony

4.0 (4.0-r1)

chrony-doc

4.0 (4.0-r1)

chrony-openrc

4.0 (4.0-r1)

chrony

4.1 (4.1-r0)

chrony-doc

4.1 (4.1-r0)

chrony-openrc

4.1 (4.1-r0)

chrony

4.1 (4.1-r0)

chrony-doc

4.1 (4.1-r0)

chrony-openrc

4.1 (4.1-r0)

chrony

4.2 (4.2-r0)

chrony-doc

4.2 (4.2-r0)

chrony-openrc

4.2 (4.2-r0)

chrony

4.3 (4.3-r0)

chrony-doc

4.3 (4.3-r0)

chrony-openrc

4.3 (4.3-r0)

chrony

4.3 (4.3-r4)

chrony-dbg

4.3 (4.3-r4)

chrony-doc

4.3 (4.3-r4)

chrony-openrc

4.3 (4.3-r4)

chrony

4.5 (4.5-r0)

chrony-dbg

4.5 (4.5-r0)

chrony-doc

4.5 (4.5-r0)

chrony-openrc

4.5 (4.5-r0)

chrony

4.5 (4.5-r0)

chrony-dbg

4.5 (4.5-r0)

chrony-doc

4.5 (4.5-r0)

chrony-openrc

4.5 (4.5-r0)

chrony

4.1 (4.1-alt1)

chrony

4.4 (4.4-alt1)

chrony

4.4 (4.4-alt1)

chrony

3.2 Potentially vulnerable (3.2-1.25.amzn1)
  • Summary:
    An NTP client/server
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2
  • Link(s):

chrony

3.2 Potentially vulnerable (3.2-1.26.amzn1)
  • Summary:
    An NTP client/server
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2
  • Link(s):

chrony

3.2 Potentially vulnerable (3.2-1.27.amzn1)
  • Summary:
    An NTP client/server
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2
  • Link(s):

chrony

4.2 (4.2-5.amzn2.0.1)

chrony

4.2 (4.2-5.amzn2.0.2)

chrony

4.0 (4.0-3.amzn2.0.2)

chrony

4.0 (4.0-3.amzn2.0.1)

chrony

3.5.1 (3.5.1-1.amzn2.0.1)

chrony

3.2 Potentially vulnerable (3.2-1.amzn2.0.1)
  • Summary:
    An NTP client/server
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2
  • Link(s):

chrony

3.2 Potentially vulnerable (3.2-1.amzn2.0.5)
  • Summary:
    An NTP client/server
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2
  • Link(s):

chrony

3.2 Potentially vulnerable (3.2-1.amzn2.0.3)
  • Summary:
    An NTP client/server
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2
  • Link(s):

chrony

3.2 Potentially vulnerable (3.2-1.amzn2.0.4)
  • Summary:
    An NTP client/server
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2
  • Link(s):

chrony

4.3 (4.3-2.0antix1)
Arch
extra

chrony

4.4 (4.4-1)

chrony

4.3 (4.3-1.0)

chrony

4.3 (4.3-1.0)

chrony

4.3 (4.3-1.0)

chrony

4.4 (4.4-1)

chrony

4.3 (4.3-1)
Artix
world

chrony

4.4 (4.4-1)

chrony

4.1

chrony

2.1.1 Potentially vulnerable (2.1.1-2.el6_8)
  • Summary:
    An NTP client/server
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2
  • Link(s):

chrony

3.4 Potentially vulnerable (3.4-1.el7)
CentOS 8
BaseOS

chrony

4.1 (4.1-1.el8)

chrony

4.2 (4.2-1.el8)

chrony

4.1 (4.1-1.el8)

chrony

3.5 Potentially vulnerable (3.5-2.el8)

chrony

4.3 (4.3-1.el9)

chrony

4.2 (4.2-1.el9)

chrony

4.1 (4.1-3.el9)

chrony

3.5 Potentially vulnerable

chrony

4.0

chrony

4.3

chrony

4.5
Deepin
main

chrony

3.4.1 Potentially vulnerable (3.4.1-1+security)
Devuan 3.0
beowulf/main

chrony

3.4 Potentially vulnerable (3.4-4+deb10u2)
Devuan 4.0
chimaera/main

chrony

4.0 (4.0-8+deb11u2)
Devuan Unstable
unstable/main

chrony

4.5 (4.5-1)
Entware
x64-k3.2

chrony

4.4 (4.4-1)
Entware
aarch64-k3.10

chrony

4.4 (4.4-1)
Entware
armv5sf-k3.2

chrony

4.4 (4.4-1)
Entware
armv7sf-k2.6

chrony

4.4 (4.4-1)
Entware
armv7sf-k3.2

chrony

4.4 (4.4-1)
Entware
mipselsf-k3.4

chrony

4.4 (4.4-1)
Entware
mipssf-k3.4

chrony

4.4 (4.4-1)
Entware
x64-k3.2

chrony-nts

4.4 (4.4-1)
Entware
aarch64-k3.10

chrony-nts

4.4 (4.4-1)
Entware
armv5sf-k3.2

chrony-nts

4.4 (4.4-1)
Entware
armv7sf-k2.6

chrony-nts

4.4 (4.4-1)
Entware
armv7sf-k3.2

chrony-nts

4.4 (4.4-1)
Entware
mipselsf-k3.4

chrony-nts

4.4 (4.4-1)
Entware
mipssf-k3.4

chrony-nts

4.4 (4.4-1)

chrony

4.1 (4.1-1.el8)
  • Summary:
    An NTP client/server
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2
  • Link(s):

chrony

3.5 Potentially vulnerable (3.5-2.el8)
  • Summary:
    An NTP client/server
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2
  • Link(s):

chrony

3.5 Potentially vulnerable (3.5-1.el8)
  • Summary:
    An NTP client/server
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2
  • Link(s):

chrony

3.3 Potentially vulnerable (3.3-3.el8)
  • Summary:
    An NTP client/server
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2
  • Link(s):

chrony

4.3 (4.3-1.el9)
EuroLinux 9
appstream

chrony

4.2 (4.2-1.el9)

chrony

4.2 (4.2-1.el9)
EuroLinux 9
appstream

chrony

4.1 (4.1-3.el9)

chrony

4.1 (4.1-3.el9)
Exherbo
platypus

net/chrony

scm
Exherbo
platypus

net/chrony

4.1
Fedora 26
updates

chrony

3.2 Potentially vulnerable (3.2-1.fc26)
Fedora 26
release

chrony

3.1 Potentially vulnerable (3.1-4.fc26)
Fedora 27
updates

chrony

3.3 Potentially vulnerable (3.3-1.fc27)
Fedora 27
release

chrony

3.2 Potentially vulnerable (3.2-1.fc27)
Fedora 28
updates

chrony

3.4 Potentially vulnerable (3.4-1.fc28)
Fedora 28
release

chrony

3.3 Potentially vulnerable (3.3-1.fc28)
Fedora 29
release

chrony

3.4 Potentially vulnerable (3.4-1.fc29)
Fedora 30
updates

chrony

3.5 Potentially vulnerable (3.5-1.fc30)
Fedora 30
release

chrony

3.4 Potentially vulnerable (3.4-2.fc30)
Fedora 31
release

chrony

3.5 Potentially vulnerable (3.5-4.fc31)
Fedora 32
updates

chrony

3.5.1 (3.5.1-1.fc32)
Fedora 32
release

chrony

3.5 Potentially vulnerable (3.5-8.fc32)
Fedora 33
updates

chrony

4.1 (4.1-1.fc33)
Fedora 33
release

chrony

4.0-pre4 (4.0-0.9.pre4.fc33)
Fedora 34
updates

chrony

4.1 (4.1-1.fc34)
Fedora 34
release

chrony

4.0 (4.0-3.fc34)
Fedora 35
updates

chrony

4.2 (4.2-1.fc35)
Fedora 35
release

chrony

4.1 (4.1-3.fc35)
Fedora 36
updates

chrony

4.3 (4.3-1.fc36)
Fedora 36
release

chrony

4.2 (4.2-5.fc36)
Fedora 37
release

chrony

4.3 (4.3-1.fc37)
Fedora 38
updates

chrony

4.4 (4.4-1.fc38)
Fedora 38
release

chrony

4.3 (4.3-3.fc38)
Fedora 39
updates

chrony

4.5 (4.5-1.fc39)
Fedora 39
development

chrony

4.4 (4.4-1.fc39)
Fedora Rawhide
development

chrony

4.5 (4.5-1.fc40)

net/chrony

4.5

net-misc/chrony

9999

net-misc/chrony

4.5

net-misc/chrony

4.4

chrony

4.4

chrony

4.5

chrony

4.4 (4.4-3)

net-misc/chrony

9999

net-misc/chrony

4.4

net-misc/chrony

4.3 (4.3-r5)

net-misc/chrony

9999

net-misc/chrony

4.5

net-misc/chrony

4.4
Mageia 8
core/release

chrony

4.0 (4.0-2.mga8)
Mageia cauldron
core/release

chrony

4.3 (4.3-1.mga9)

chrony

4.4 (4.4-1)

chrony

4.4 (4.4-1)

chrony

4.4 (4.4-1)

chrony

4.4

chrony

3.4 Potentially vulnerable (3.4-3.oe1)

chrony

4.1 (4.1-1.oe2203)
openmamba
devel

chrony

4.5 (4.5-1mamba)
OpenMandriva 4.0
unsupported/release

chrony

3.4 Potentially vulnerable (3.4-2)
OpenMandriva 4.1
unsupported/release

chrony

3.5 Potentially vulnerable (3.5-1)
OpenMandriva 4.2
unsupported/release

chrony

3.5 Potentially vulnerable (3.5-1)
OpenMandriva 4.3
unsupported/release

chrony

3.5 Potentially vulnerable (3.5-1)
OpenMandriva Rolling
unsupported/release

chrony

4.4 (4.4-1)
OpenMandriva Cooker
unsupported/release

chrony

4.4 (4.4-1)

chrony

4.5

chrony

2.3 Potentially vulnerable (2.3-3.20)
openSUSE Leap 42.3
updates/oss

chrony

2.3 Potentially vulnerable (2.3-10.1)
openSUSE Leap 42.3
updates/oss

chrony

2.3 Potentially vulnerable (2.3-6.1)
openSUSE Leap 15.0
updates/sle

chrony

4.1 (4.1-150300.16.3.1)
openSUSE Leap 15.0
updates/sle

chrony

4.1 (4.1-150300.16.9.1)

chrony

3.2 Potentially vulnerable (3.2-lp150.5.5)
openSUSE Leap 15.0
updates/oss

chrony

3.2 Potentially vulnerable (3.2-lp150.11.2)
openSUSE Leap 15.0
updates/oss

chrony

3.2 Potentially vulnerable (3.2-lp150.8.1)
openSUSE Leap 15.0
updates/sle

chrony

3.2 Potentially vulnerable (3.2-9.24.2)
openSUSE Leap 15.1
updates/sle

chrony

4.1 (4.1-150300.16.3.1)
openSUSE Leap 15.1
updates/sle

chrony

4.1 (4.1-150300.16.9.1)

chrony

3.2 Potentially vulnerable (3.2-lp151.8.6)
openSUSE Leap 15.1
updates/oss

chrony

3.2 Potentially vulnerable (3.2-lp151.9.12.2)
openSUSE Leap 15.1
updates/oss

chrony

3.2 Potentially vulnerable (3.2-lp151.9.3.1)
openSUSE Leap 15.1
updates/oss

chrony

3.2 Potentially vulnerable (3.2-lp151.9.6.1)
openSUSE Leap 15.1
updates/oss

chrony

3.2 Potentially vulnerable (3.2-lp151.9.9.1)
openSUSE Leap 15.1
updates/sle

chrony

3.2 Potentially vulnerable (3.2-9.24.2)
openSUSE Leap 15.2
updates/sle

chrony

4.1 (4.1-150300.16.3.1)
openSUSE Leap 15.2
updates/sle

chrony

4.1 (4.1-150300.16.9.1)
openSUSE Leap 15.2
updates/oss

chrony

3.2 Potentially vulnerable (3.2-lp152.13.3.2)
openSUSE Leap 15.2
updates/oss

chrony

3.2 Potentially vulnerable (3.2-lp152.13.6.1)
openSUSE Leap 15.2
updates/oss

chrony

3.2 Potentially vulnerable (3.2-lp152.13.9.1)
openSUSE Leap 15.2
updates/sle

chrony

3.2 Potentially vulnerable (3.2-9.24.2)

chrony

3.2 Potentially vulnerable (3.2-lp152.12.1)
openSUSE Leap 15.3
updates/sle

chrony

4.1 (4.1-150300.16.3.1)
openSUSE Leap 15.3
updates/sle

chrony

4.1 (4.1-150300.16.9.1)

chrony

3.2 Potentially vulnerable (3.2-9.21.1)
openSUSE Leap 15.3
updates/sle

chrony

3.2 Potentially vulnerable (3.2-9.24.2)

chrony

4.1 (4.1-150400.19.4)
openSUSE Leap 15.4
updates/sle

chrony

4.1 (4.1-150300.16.3.1)
openSUSE Leap 15.4
updates/sle

chrony

4.1 (4.1-150300.16.9.1)
openSUSE Leap 15.4
updates/sle

chrony

3.2 Potentially vulnerable (3.2-9.24.2)

chrony

4.1 (4.1-150400.19.4)
openSUSE Leap 15.5
updates/sle

chrony

4.1 (4.1-150300.16.3.1)
openSUSE Leap 15.5
updates/sle

chrony

4.1 (4.1-150300.16.9.1)
openSUSE Leap 15.5
updates/sle

chrony

3.2 Potentially vulnerable (3.2-9.24.2)

chrony

4.4 (4.4-2.1)

chrony

2.4.1 Potentially vulnerable (2.4.1-2)
Parabola
extra

chrony

4.4 (4.4-1)

chrony

4.0 (4.0-8+deb11u2)
Parrot
parrot/main

chrony

4.0 (4.0-8+deb11u2)
Parrot
parrot-updates/main

chrony

4.0 (4.0-8+deb11u2)

net/chrony

4.2 (4.2nb4)

chrony

3.4 Potentially vulnerable (3.4-4+deb10u2)

chrony

4.3 (4.3-2+deb12u1)

chrony

4.0 (4.0-8+deb11u2)

chrony

4.3 (4.3-2+deb12u1)

chrony

4.4 (4.4-3)

chrony

4.2 (4.2-1.el8.rocky.1.0)

chrony

4.3 (4.3-1.el9)
Rosa 2014.1
contrib/release

chrony

1.27-pre1 Potentially vulnerable (1.27-0.pre1git1ca844a.2)
Rosa 2021.1
main/release

chrony

4.1 (4.1-1)
Rosa 2021.1
contrib/release

chrony

3.5 Potentially vulnerable (3.5-1)
Rosa Server 7.3
base/release

chrony

2.1.1 Potentially vulnerable (2.1.1-4.res7c)
Rosa Server 7.5
base/release

chrony

3.2 Potentially vulnerable (3.2-2.res7c)
Rosa Server 7.5
base/release

chrony

2.1.1 Potentially vulnerable (2.1.1-4.res7c)

chrony

3.4 Potentially vulnerable (3.4-1.el7)
  • Summary:
    An NTP client/server
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2
  • Link(s):

chrony

3.2 Potentially vulnerable (3.2-2.el7)
  • Summary:
    An NTP client/server
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2
  • Link(s):

chrony

3.1 Potentially vulnerable (3.1-2.el7)
  • Summary:
    An NTP client/server
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2
  • Link(s):

chrony

2.1.1 Potentially vulnerable (2.1.1-1.el7)
  • Summary:
    An NTP client/server
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2
  • Link(s):

chrony

2.1.1 Potentially vulnerable (2.1.1-3.el7)
  • Summary:
    An NTP client/server
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2
  • Link(s):

chrony

2.1.1 Potentially vulnerable (2.1.1-4.el7_3)
  • Summary:
    An NTP client/server
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2
  • Link(s):

chrony

1.29.1 Potentially vulnerable (1.29.1-1.el7)
  • Summary:
    An NTP client/server
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2
  • Link(s):

chrony

1.29 Potentially vulnerable (1.29-2.el7)
  • Summary:
    An NTP client/server
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2
  • Link(s):

chrony

4.4

chrony

4.5
Trisquel 10.0
nabia/main

chrony

3.5 Potentially vulnerable (3.5-6ubuntu6)
Trisquel 10.0
nabia-updates/main

chrony

3.5 Potentially vulnerable (3.5-6ubuntu6.2)
Trisquel 10.0
nabia-security/main

chrony

3.5 Potentially vulnerable (3.5-6ubuntu6.2)
Trisquel 11.0
aramo/main

chrony

4.2 (4.2-2ubuntu2)
Ubuntu 14.04
trusty/universe

chrony

1.29 Potentially vulnerable (1.29-1)
Ubuntu 14.04
trusty-updates/universe

chrony

1.29 Potentially vulnerable (1.29-1ubuntu0.1)
Ubuntu 16.04
xenial/universe

chrony

2.1.1 Potentially vulnerable (2.1.1-1)
Ubuntu 16.04
xenial-updates/universe

chrony

2.1.1 Potentially vulnerable (2.1.1-1ubuntu0.1)

chrony

4.4 (4.4_1)

chrony

4.3