Versions Packages Information History CVEs Related Badges Report

Packages for chrony

203 package(s) known

chrony

3.5.1 (3.5.1-r0)

chrony-dbg

3.5.1 (3.5.1-r0)

chrony-doc

3.5.1 (3.5.1-r0)

chrony-openrc

3.5.1 (3.5.1-r0)

chrony

3.5 Potentially vulnerable (3.5-2.el8.alma)

chrony

3.3 Potentially vulnerable (3.3-r0)

chrony-doc

3.3 Potentially vulnerable (3.3-r0)

chrony

3.4 Potentially vulnerable (3.4-r2)

chrony-doc

3.4 Potentially vulnerable (3.4-r2)

chrony

3.5.1 (3.5.1-r0)

chrony-doc

3.5.1 (3.5.1-r0)

chrony-openrc

3.5.1 (3.5.1-r0)

chrony

3.5.1 (3.5.1-r0)

chrony-doc

3.5.1 (3.5.1-r0)

chrony-openrc

3.5.1 (3.5.1-r0)

chrony

3.5.1 (3.5.1-r0)

chrony-doc

3.5.1 (3.5.1-r0)

chrony-openrc

3.5.1 (3.5.1-r0)

chrony

4.0 (4.0-r1)

chrony-doc

4.0 (4.0-r1)

chrony-openrc

4.0 (4.0-r1)

chrony

4.1 (4.1-r0)

chrony-doc

4.1 (4.1-r0)

chrony-openrc

4.1 (4.1-r0)

chrony

4.1 (4.1-r0)

chrony-doc

4.1 (4.1-r0)

chrony-openrc

4.1 (4.1-r0)

chrony

3.5.1 (3.5.1-alt1)

chrony

4.1 (4.1-alt1)

chrony

4.1 (4.1-alt1)

chrony

3.2 Potentially vulnerable (3.2-1.26.amzn1)
  • Summary:
    An NTP client/server
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2
  • Links(s):

chrony

3.2 Potentially vulnerable (3.2-1.25.amzn1)
  • Summary:
    An NTP client/server
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2
  • Links(s):

chrony

3.2 Potentially vulnerable (3.2-1.27.amzn1)
  • Summary:
    An NTP client/server
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2
  • Links(s):

chrony

4.0 (4.0-3.amzn2.0.2)
  • Summary:
    An NTP client/server
  • Category:
    • Unspecified
  • License:
    • GPLv2
  • Links(s):

chrony

4.0 (4.0-3.amzn2.0.1)
  • Summary:
    An NTP client/server
  • Category:
    • Unspecified
  • License:
    • GPLv2
  • Links(s):

chrony

3.5.1 (3.5.1-1.amzn2.0.1)
  • Summary:
    An NTP client/server
  • Category:
    • Unspecified
  • License:
    • GPLv2
  • Links(s):

chrony

3.2 Potentially vulnerable (3.2-1.amzn2.0.4)
  • Summary:
    An NTP client/server
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2
  • Links(s):

chrony

3.2 Potentially vulnerable (3.2-1.amzn2.0.1)
  • Summary:
    An NTP client/server
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2
  • Links(s):

chrony

3.2 Potentially vulnerable (3.2-1.amzn2.0.5)
  • Summary:
    An NTP client/server
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2
  • Links(s):

chrony

3.2 Potentially vulnerable (3.2-1.amzn2.0.3)
  • Summary:
    An NTP client/server
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2
  • Links(s):

chrony

4.0 (4.0-1)
Arch
community

chrony

4.1 (4.1-1)
Artix
galaxy

chrony

4.1 (4.1-1)

chrony

3.4 Potentially vulnerable (3.4-4+deb10u1)

chrony

3.4 Potentially vulnerable (3.4-4+deb10u1)

chrony

4.1

chrony

2.1.1 Potentially vulnerable (2.1.1-2.el6_8)
  • Summary:
    An NTP client/server
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2
  • Links(s):

chrony

3.4 Potentially vulnerable (3.4-1.el7)
CentOS 8
BaseOS

chrony

3.5 Potentially vulnerable (3.5-2.el8)

chrony

3.5 Potentially vulnerable

chrony

4.0

chrony

4.1
Debian 8
jessie/main

chrony

1.30 Potentially vulnerable (1.30-2+deb8u2)
Deepin
main

chrony

3.4.1 Potentially vulnerable (3.4.1-1+security)

chrony

1.30 Potentially vulnerable (1.30-2+deb8u2)

chrony

3.0 Potentially vulnerable (3.0-4+deb9u2)

chrony

3.4 Potentially vulnerable (3.4-4+deb10u1)
Devuan 4.0 (Chimaera)
chimaera/main

chrony

4.0 (4.0-8)
Devuan Unstable
unstable/main

chrony

4.1 (4.1-3)

net/chrony

4.1
Entware
armv7sf-k3.2

chrony

4.1 (4.1-2)
Entware
mipselsf-k3.4

chrony

4.1 (4.1-2)
Entware
mipssf-k3.4

chrony

4.1 (4.1-2)
Entware
x64-k3.2

chrony

4.1 (4.1-2)
Entware
aarch64-k3.10

chrony

4.1 (4.1-2)
Entware
armv5sf-k3.2

chrony

4.1 (4.1-2)
Entware
armv7sf-k2.6

chrony

4.1 (4.1-2)
Entware
armv7sf-k3.2

chrony-nts

4.1 (4.1-2)
Entware
mipselsf-k3.4

chrony-nts

4.1 (4.1-2)
Entware
mipssf-k3.4

chrony-nts

4.1 (4.1-2)
Entware
x64-k3.2

chrony-nts

4.1 (4.1-2)
Entware
aarch64-k3.10

chrony-nts

4.1 (4.1-2)
Entware
armv5sf-k3.2

chrony-nts

4.1 (4.1-2)
Entware
armv7sf-k2.6

chrony-nts

4.1 (4.1-2)
Exherbo
platypus

net/chrony

scm
Exherbo
platypus

net/chrony

4.1
Fedora 26
updates

chrony

3.2 Potentially vulnerable (3.2-1.fc26)
Fedora 26
release

chrony

3.1 Potentially vulnerable (3.1-4.fc26)
Fedora 27
updates

chrony

3.3 Potentially vulnerable (3.3-1.fc27)
Fedora 27
release

chrony

3.2 Potentially vulnerable (3.2-1.fc27)
Fedora 28
updates

chrony

3.4 Potentially vulnerable (3.4-1.fc28)
Fedora 28
release

chrony

3.3 Potentially vulnerable (3.3-1.fc28)
Fedora 29
release

chrony

3.4 Potentially vulnerable (3.4-1.fc29)
Fedora 30
updates

chrony

3.5 Potentially vulnerable (3.5-1.fc30)
Fedora 30
release

chrony

3.4 Potentially vulnerable (3.4-2.fc30)
Fedora 31
release

chrony

3.5 Potentially vulnerable (3.5-4.fc31)
Fedora 32
updates

chrony

3.5.1 (3.5.1-1.fc32)
Fedora 32
release

chrony

3.5 Potentially vulnerable (3.5-8.fc32)
Fedora 33
updates

chrony

4.1 (4.1-1.fc33)
Fedora 33
release

chrony

4.0-pre4 (4.0-0.9.pre4.fc33)
Fedora 34
updates

chrony

4.1 (4.1-1.fc34)
Fedora 34
release

chrony

4.0 (4.0-3.fc34)

chrony

4.1 (4.1-3.fc35)

net/chrony

4.1
Funtoo 1.4
net-kit

net-misc/chrony

4.0

net-misc/chrony

9999

net-misc/chrony

4.1 (4.1-r1)

chrony

4.1

chrony

4.1
Hyperbola
community

chrony

3.1 Potentially vulnerable (3.1-1.hyperbola2)

chrony

4.1 (4.1-3)

net-misc/chrony

9999

net-misc/chrony

4.1 (4.1-r1)

net-misc/chrony

4.0 (4.0-r2)

net-misc/chrony

9999

net-misc/chrony

4.1 (4.1-r1)

chrony

4.1

chrony

4.1
Mageia 7
core/release

chrony

3.4 Potentially vulnerable (3.4-2.mga7)
Mageia 7
core/updates

chrony

3.4 Potentially vulnerable (3.4-2.1.mga7)
Mageia 8
core/release

chrony

4.0 (4.0-2.mga8)
  • Summary:
    An NTP client/server
  • Category:
    • System/Servers
  • License:
    • GPLv2
  • Links(s):
Mageia Cauldron
core/release

chrony

4.1 (4.1-1.mga9)
Manjaro Stable
community

chrony

4.1 (4.1-1)
Manjaro Testing
community

chrony

4.1 (4.1-1)

chrony

4.1 (4.1-1)

chrony

4.1

chrony

3.4 Potentially vulnerable (3.4-3.oe1)
openmamba
devel

chrony

4.1 (4.1-1mamba)
OpenMandriva 4.0
unsupported/release

chrony

3.4 Potentially vulnerable (3.4-2)
OpenMandriva Cooker
unsupported/release

chrony

3.5 Potentially vulnerable (3.5-1)

chrony

4.1

chrony

2.3 Potentially vulnerable (2.3-3.20)
openSUSE Leap 42.3
updates/oss

chrony

2.3 Potentially vulnerable (2.3-10.1)
openSUSE Leap 42.3
updates/oss

chrony

2.3 Potentially vulnerable (2.3-6.1)
openSUSE Leap 15.0
updates/oss

chrony

3.2 Potentially vulnerable (3.2-lp150.11.2)
openSUSE Leap 15.0
updates/oss

chrony

3.2 Potentially vulnerable (3.2-lp150.8.1)

chrony

3.2 Potentially vulnerable (3.2-lp150.5.5)
openSUSE Leap 15.1
updates/oss

chrony

3.2 Potentially vulnerable (3.2-lp151.9.12.2)
openSUSE Leap 15.1
updates/oss

chrony

3.2 Potentially vulnerable (3.2-lp151.9.3.1)
openSUSE Leap 15.1
updates/oss

chrony

3.2 Potentially vulnerable (3.2-lp151.9.6.1)
openSUSE Leap 15.1
updates/oss

chrony

3.2 Potentially vulnerable (3.2-lp151.9.9.1)

chrony

3.2 Potentially vulnerable (3.2-lp151.8.6)
openSUSE Leap 15.2
updates/oss

chrony

3.2 Potentially vulnerable (3.2-lp152.13.3.2)
openSUSE Leap 15.2
updates/oss

chrony

3.2 Potentially vulnerable (3.2-lp152.13.6.1)
openSUSE Leap 15.2
updates/oss

chrony

3.2 Potentially vulnerable (3.2-lp152.13.9.1)

chrony

3.2 Potentially vulnerable (3.2-lp152.12.1)

chrony

3.2 Potentially vulnerable (3.2-9.21.1)

chrony

4.1 (4.1-5.2)

chrony

2.4.1 Potentially vulnerable (2.4.1-2)

chrony

3.5.1 (3.5.1-1)

chrony-nts

4.1 (4.1-2)
Parabola
community

chrony

4.1 (4.1-1)

chrony

3.0 Potentially vulnerable (3.0-4+deb9u2)

chrony

3.4 Potentially vulnerable (3.4-4+deb10u1)

chrony

4.0 (4.0-8)
Parrot
main

chrony

4.0 (4.0-8)

net/chrony

4.1

chrony

3.4 Potentially vulnerable (3.4-4+deb10u1)

chrony

4.0 (4.0-8)

chrony

3.4 Potentially vulnerable (3.4-4+deb10u1)

chrony

4.0 (4.0-8)

chrony

4.1 (4.1-3)

chrony

3.5 Potentially vulnerable (3.5-2.el8)
Rosa 2014.1
contrib/updates

chrony

1.31.2 Potentially vulnerable (1.31.2-1)
Rosa 2014.1
contrib/release

chrony

1.27-pre1 Potentially vulnerable (1.27-0.pre1git1ca844a.2)
Rosa 2016.1
contrib/release

chrony

1.31.2 Potentially vulnerable (1.31.2-3)
Rosa 2019.1
main/release

chrony

4.1 (4.1-1)
Rosa 2019.1
contrib/release

chrony

3.5 Potentially vulnerable (3.5-1)
Rosa Server 7.3
base/release

chrony

2.1.1 Potentially vulnerable (2.1.1-4.res7c)
Rosa Server 7.5
base/release

chrony

3.2 Potentially vulnerable (3.2-2.res7c)
Rosa Server 7.5
base/release

chrony

2.1.1 Potentially vulnerable (2.1.1-4.res7c)

chrony

3.4 Potentially vulnerable (3.4-1.el7)
  • Summary:
    An NTP client/server
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2
  • Links(s):

chrony

3.2 Potentially vulnerable (3.2-2.el7)
  • Summary:
    An NTP client/server
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2
  • Links(s):

chrony

3.1 Potentially vulnerable (3.1-2.el7)
  • Summary:
    An NTP client/server
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2
  • Links(s):

chrony

2.1.1 Potentially vulnerable (2.1.1-4.el7_3)
  • Summary:
    An NTP client/server
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2
  • Links(s):

chrony

2.1.1 Potentially vulnerable (2.1.1-1.el7)
  • Summary:
    An NTP client/server
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2
  • Links(s):

chrony

2.1.1 Potentially vulnerable (2.1.1-3.el7)
  • Summary:
    An NTP client/server
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2
  • Links(s):

chrony

1.29.1 Potentially vulnerable (1.29.1-1.el7)
  • Summary:
    An NTP client/server
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2
  • Links(s):

chrony

1.29 Potentially vulnerable (1.29-2.el7)
  • Summary:
    An NTP client/server
  • Category:
    • System Environment/Daemons
  • License:
    • GPLv2
  • Links(s):

chrony

4.1
Trisquel 6.0
toutatis/main

chrony

1.24 Potentially vulnerable (1.24-3.1ubuntu1)
Trisquel 7.0
belenos-updates/main

chrony

1.29 Potentially vulnerable (1.29-1ubuntu0.1)
Trisquel 7.0
belenos/main

chrony

1.29 Potentially vulnerable (1.29-1)
Trisquel 8.0
flidas/main

chrony

2.1.1 Potentially vulnerable (2.1.1-1)
Trisquel 8.0
flidas-updates/main

chrony

2.1.1 Potentially vulnerable (2.1.1-1ubuntu0.1)
Trisquel 9.0
etiona/main

chrony

3.2 Potentially vulnerable (3.2-4ubuntu4)
Trisquel 9.0
etiona-updates/main

chrony

3.2 Potentially vulnerable (3.2-4ubuntu4.5)
Ubuntu 14.04
trusty/universe

chrony

1.29 Potentially vulnerable (1.29-1)
Ubuntu 14.04
trusty-updates/universe

chrony

1.29 Potentially vulnerable (1.29-1ubuntu0.1)
Ubuntu 16.04
xenial-updates/universe

chrony

2.1.1 Potentially vulnerable (2.1.1-1ubuntu0.1)

chrony

4.1 (4.1_1)