Versions Packages Information History CVEs Related Badges Report

Versions for chrony

225 package(s) known

Repository Package name Version Category Maintainer(s)
Adélie Linux current
user
chrony-dbg 3.5.1 - djt@hxx.in
Adélie Linux current
user
chrony-doc 3.5.1 - djt@hxx.in
Adélie Linux current
user
chrony-openrc 3.5.1 - djt@hxx.in
Adélie Linux current
user
chrony 3.5.1 - djt@hxx.in
AlmaLinux 8
BaseOS
chrony 4.1 System Environment/Daemons packager@almalinux.org
Alpine Linux 3.8
main
chrony-doc 3.3 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
chrony 3.3 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
chrony-doc 3.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
chrony 3.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
chrony 3.5.1 - ncopa@alpinelinux.org
Alpine Linux 3.10
main
chrony-doc 3.5.1 - ncopa@alpinelinux.org
Alpine Linux 3.10
main
chrony-openrc 3.5.1 - ncopa@alpinelinux.org
Alpine Linux 3.11
main
chrony 3.5.1 - ncopa@alpinelinux.org
Alpine Linux 3.11
main
chrony-openrc 3.5.1 - ncopa@alpinelinux.org
Alpine Linux 3.11
main
chrony-doc 3.5.1 - ncopa@alpinelinux.org
Alpine Linux 3.12
main
chrony-doc 3.5.1 - ncopa@alpinelinux.org
Alpine Linux 3.12
main
chrony 3.5.1 - ncopa@alpinelinux.org
Alpine Linux 3.12
main
chrony-openrc 3.5.1 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
chrony 4.0 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
chrony-openrc 4.0 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
chrony-doc 4.0 - ncopa@alpinelinux.org
Alpine Linux 3.14
main
chrony 4.1 - ncopa@alpinelinux.org
Alpine Linux 3.14
main
chrony-openrc 4.1 - ncopa@alpinelinux.org
Alpine Linux 3.14
main
chrony-doc 4.1 - ncopa@alpinelinux.org
Alpine Linux 3.15
main
chrony-openrc 4.1 - ncopa@alpinelinux.org
Alpine Linux 3.15
main
chrony-doc 4.1 - ncopa@alpinelinux.org
Alpine Linux 3.15
main
chrony 4.1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
chrony-doc 4.2 - ncopa@alpinelinux.org
Alpine Linux Edge
main
chrony 4.2 - ncopa@alpinelinux.org
Alpine Linux Edge
main
chrony-openrc 4.2 - ncopa@alpinelinux.org
ALT Linux p9 chrony 3.5.1 System/Configuration/Other rider@altlinux.org
ALT Linux p10 chrony 4.1 System/Configuration/Other rider@altlinux.org
ALT Sisyphus chrony 4.2 System/Configuration/Other rider@altlinux.org
Amazon Linux 1
main
chrony 3.2 Potentially vulnerable System Environment/Daemons -
Amazon Linux 1
updates
chrony 3.2 Potentially vulnerable System Environment/Daemons -
Amazon Linux 1
updates
chrony 3.2 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 chrony 4.0 Unspecified -
Amazon Linux 2 chrony 4.0 Unspecified -
Amazon Linux 2 chrony 3.5.1 Unspecified -
Amazon Linux 2 chrony 3.2 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 chrony 3.2 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 chrony 3.2 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 chrony 3.2 Potentially vulnerable System Environment/Daemons -
AOSC chrony 4.2 admin fallback-mnt-aosc@repology
Arch
community
chrony 4.2 - -
Arch Linux 32 i486
community
chrony 4.0 - -
Arch Linux 32 i686
community
chrony 4.1 - -
Arch Linux 32 pentium4
community
chrony 4.1 - -
Arch Linux ARM aarch64
community
chrony 4.2 - -
Arch Linux ARM armv7h
community
chrony 4.2 - -
Artix
galaxy
chrony 4.2 - -
Astra Orel Stable
main
chrony 3.4 Potentially vulnerable net vincent.debian@free.fr, joodebian@joonet.de
Ataraxia GNU/Linux chrony 4.1 admin nagakamira@gmail.com
CentOS 6
os
chrony 2.1.1 Potentially vulnerable System Environment/Daemons -
CentOS 7
os
chrony 3.4 Potentially vulnerable System Environment/Daemons -
CentOS 8
BaseOS
chrony 4.1 System Environment/Daemons bugs@centos.org
CentOS Stream 8
BaseOS
chrony 4.1 System Environment/Daemons bugs@centos.org
CentOS Stream 8
BaseOS
chrony 3.5 Potentially vulnerable System Environment/Daemons bugs@centos.org
CentOS Stream 9
BaseOS
chrony 4.2 Unspecified builder@centos.org
CentOS Stream 9
BaseOS
chrony 4.1 Unspecified builder@centos.org
CRUX 3.4
opt
chrony 3.5 Potentially vulnerable - jue@crux.nu
CRUX 3.5
opt
chrony 4.0 - jue@crux.nu
CRUX 3.6
opt
chrony 4.2 - jue@crux.nu
Debian 8
jessie/main
chrony 1.30 Potentially vulnerable admin joodebian@joonet.de, vincent.debian@free.fr
Debian 9
stretch/main
chrony 3.0 Potentially vulnerable net vincent.debian@free.fr, joodebian@joonet.de
Debian 10
buster/main
chrony 3.4 Potentially vulnerable net vincent.debian@free.fr, joodebian@joonet.de
Debian 10 Backports
buster-backports/main
chrony 4.0 misc vincent.debian@free.fr
Debian 11
bullseye/main
chrony 4.0 net vincent.debian@free.fr
Debian 12
bookworm/main
chrony 4.2 net vincent.debian@free.fr
Debian Unstable
sid/main
chrony 4.2 net vincent.debian@free.fr
Deepin
main
chrony 3.4.1 Potentially vulnerable - vincent.debian@free.fr, joodebian@joonet.de
Devuan 1.0
jessie/main
chrony 1.30 Potentially vulnerable admin joodebian@joonet.de, vincent.debian@free.fr
Devuan 2.0
ascii/main
chrony 3.0 Potentially vulnerable net vincent.debian@free.fr, joodebian@joonet.de
Devuan 3.0
beowulf/main
chrony 3.4 Potentially vulnerable net vincent.debian@free.fr, joodebian@joonet.de
Devuan 4.0
chimaera/main
chrony 4.0 net vincent.debian@free.fr
Devuan Unstable
unstable/main
chrony 4.2 net vincent.debian@free.fr
DPorts net/chrony 4.2 net mandree@freebsd.org
Entware
armv7sf-k3.2
chrony-nts 4.2 net mlichvar0@gmail.com
Entware
mipselsf-k3.4
chrony 4.2 net mlichvar0@gmail.com
Entware
aarch64-k3.10
chrony 4.2 net mlichvar0@gmail.com
Entware
aarch64-k3.10
chrony-nts 4.2 net mlichvar0@gmail.com
Entware
armv5sf-k3.2
chrony 4.2 net mlichvar0@gmail.com
Entware
armv5sf-k3.2
chrony-nts 4.2 net mlichvar0@gmail.com
Entware
armv7sf-k2.6
chrony 4.2 net mlichvar0@gmail.com
Entware
armv7sf-k2.6
chrony-nts 4.2 net mlichvar0@gmail.com
Entware
armv7sf-k3.2
chrony 4.2 net mlichvar0@gmail.com
Entware
mipselsf-k3.4
chrony-nts 4.2 net mlichvar0@gmail.com
Entware
mipssf-k3.4
chrony 4.2 net mlichvar0@gmail.com
Entware
mipssf-k3.4
chrony-nts 4.2 net mlichvar0@gmail.com
Entware
x64-k3.2
chrony 4.2 net mlichvar0@gmail.com
Entware
x64-k3.2
chrony-nts 4.2 net mlichvar0@gmail.com
EuroLinux 8
baseos
chrony 4.1 System Environment/Daemons -
EuroLinux 8
baseos
chrony 3.5 Potentially vulnerable System Environment/Daemons -
EuroLinux 8
baseos
chrony 3.5 Potentially vulnerable System Environment/Daemons -
EuroLinux 8
baseos
chrony 3.3 Potentially vulnerable System Environment/Daemons -
Exherbo
platypus
net/chrony scm net fallback-mnt-exherbo@repology
Exherbo
platypus
net/chrony 4.1 net fallback-mnt-exherbo@repology
Fedora 26
updates
chrony 3.2 Potentially vulnerable System Environment/Daemons -
Fedora 26
release
chrony 3.1 Potentially vulnerable System Environment/Daemons -
Fedora 27
updates
chrony 3.3 Potentially vulnerable System Environment/Daemons -
Fedora 27
release
chrony 3.2 Potentially vulnerable System Environment/Daemons -
Fedora 28
updates
chrony 3.4 Potentially vulnerable System Environment/Daemons -
Fedora 28
release
chrony 3.3 Potentially vulnerable System Environment/Daemons -
Fedora 29
release
chrony 3.4 Potentially vulnerable System Environment/Daemons -
Fedora 30
updates
chrony 3.5 Potentially vulnerable Unspecified -
Fedora 30
release
chrony 3.4 Potentially vulnerable Unspecified -
Fedora 31
release
chrony 3.5 Potentially vulnerable Unspecified -
Fedora 32
updates
chrony 3.5.1 Unspecified -
Fedora 32
release
chrony 3.5 Potentially vulnerable Unspecified -
Fedora 33
updates
chrony 4.1 Unspecified -
Fedora 33
release
chrony 4.0-pre4 Unspecified -
Fedora 34
updates
chrony 4.1 Unspecified -
Fedora 34
release
chrony 4.0 Unspecified -
Fedora 35
updates
chrony 4.2 Unspecified -
Fedora 35
release
chrony 4.1 Unspecified -
Fedora 36
development
chrony 4.2 Unspecified -
Fedora Rawhide
development
chrony 4.2 Unspecified -
FreeBSD Ports net/chrony 4.2 net mandree@freebsd.org
Funtoo 1.4
net-kit
net-misc/chrony 4.0 net-misc jer@gentoo.org
Gentoo net-misc/chrony 9999 net-misc sam@gentoo.org, base-system@gentoo.org
Gentoo net-misc/chrony 4.2 net-misc sam@gentoo.org, base-system@gentoo.org
GNU Guix chrony 4.2 - -
Homebrew chrony 4.2 - -
Kali Linux Rolling
main
chrony 4.2 net vincent.debian@free.fr
LiGurOS stable net-misc/chrony 9999 net-misc sam@gentoo.org, base-system@gentoo.org
LiGurOS stable net-misc/chrony 4.2 net-misc sam@gentoo.org, base-system@gentoo.org
LiGurOS develop net-misc/chrony 9999 net-misc sam@gentoo.org, base-system@gentoo.org
LiGurOS develop net-misc/chrony 4.2 net-misc sam@gentoo.org, base-system@gentoo.org
MacPorts chrony 4.2 sysutils lbschenkel@macports, lbschenkel@github
Mageia 7
core/release
chrony 3.4 Potentially vulnerable System/Servers -
Mageia 7
core/updates
chrony 3.4 Potentially vulnerable System/Servers -
Mageia 8
core/release
chrony 4.0 System/Servers -
Mageia Cauldron
core/release
chrony 4.2 System/Servers -
Manjaro Stable
community
chrony 4.2 - -
Manjaro Testing
community
chrony 4.2 - -
Manjaro Unstable
community
chrony 4.2 - -
nixpkgs stable 21.05 chrony 4.1 - fpletz@fnordicwalking.de, aseipp@pobox.com
nixpkgs stable 21.11 chrony 4.1 - fpletz@fnordicwalking.de, aseipp@pobox.com
nixpkgs unstable chrony 4.2 - fpletz@fnordicwalking.de, aseipp@pobox.com
openEuler 20.03
source
chrony 3.4 Potentially vulnerable Unspecified -
openmamba
devel
chrony 4.2 System/Servers silvan.calarco@mambasoft.it
OpenMandriva 4.0
unsupported/release
chrony 3.4 Potentially vulnerable System/Base bero@lindev.ch
OpenMandriva 4.1
unsupported/release
chrony 3.5 Potentially vulnerable System/Base nobodydead@gmail.com
OpenMandriva 4.2
unsupported/release
chrony 3.5 Potentially vulnerable System/Base nobodydead@gmail.com
OpenMandriva Rolling
unsupported/release
chrony 3.5 Potentially vulnerable System/Base nobodydead@gmail.com
OpenMandriva Cooker
unsupported/release
chrony 3.5 Potentially vulnerable System/Base nobodydead@gmail.com
OpenPKG chrony 4.2 Networking -
openSUSE Leap 42.3
updates/oss
chrony 2.3 Potentially vulnerable Productivity/Networking/Other -
openSUSE Leap 42.3
updates/oss
chrony 2.3 Potentially vulnerable Productivity/Networking/Other -
openSUSE Leap 42.3
main/oss
chrony 2.3 Potentially vulnerable Productivity/Networking/Other -
openSUSE Leap 15.0
main/oss
chrony 3.2 Potentially vulnerable Productivity/Networking/Other -
openSUSE Leap 15.0
updates/oss
chrony 3.2 Potentially vulnerable Productivity/Networking/Other -
openSUSE Leap 15.0
updates/oss
chrony 3.2 Potentially vulnerable Productivity/Networking/Other -
openSUSE Leap 15.1
main/oss
chrony 3.2 Potentially vulnerable Productivity/Networking/Other -
openSUSE Leap 15.1
updates/oss
chrony 3.2 Potentially vulnerable Productivity/Networking/Other -
openSUSE Leap 15.1
updates/oss
chrony 3.2 Potentially vulnerable Productivity/Networking/Other -
openSUSE Leap 15.1
updates/oss
chrony 3.2 Potentially vulnerable Productivity/Networking/Other -
openSUSE Leap 15.1
updates/oss
chrony 3.2 Potentially vulnerable Productivity/Networking/Other -
openSUSE Leap 15.2
updates/oss
chrony 3.2 Potentially vulnerable Productivity/Networking/Other -
openSUSE Leap 15.2
updates/oss
chrony 3.2 Potentially vulnerable Productivity/Networking/Other -
openSUSE Leap 15.2
updates/oss
chrony 3.2 Potentially vulnerable Productivity/Networking/Other -
openSUSE Leap 15.2
main/oss
chrony 3.2 Potentially vulnerable Productivity/Networking/Other -
openSUSE Leap 15.3
main/oss
chrony 3.2 Potentially vulnerable Productivity/Networking/Other -
openSUSE Leap 15.4
main/oss
chrony 4.1 Productivity/Networking/Other -
openSUSE Tumbleweed
src-oss
chrony 4.2 Productivity/Networking/Other -
OpenWrt 17.01 x86_64
packages
chrony 2.4.1 Potentially vulnerable net mlichvar0@gmail.com
OpenWrt 18.06 x86_64
packages
chrony 3.3 Potentially vulnerable net mlichvar0@gmail.com
OpenWrt 19.07 x86_64
packages
chrony 3.5.1 net mlichvar0@gmail.com
OpenWrt 21.02 x86_64
packages
chrony-nts 4.1 net mlichvar0@gmail.com
OpenWrt 21.02 x86_64
packages
chrony 4.1 net mlichvar0@gmail.com
Parabola
community
chrony 4.2 - -
Pardus 17
main
chrony 3.0 Potentially vulnerable net vincent.debian@free.fr, joodebian@joonet.de
Pardus 19
main
chrony 3.4 Potentially vulnerable net vincent.debian@free.fr, joodebian@joonet.de
Pardus 21
main
chrony 4.0 net vincent.debian@free.fr
Parrot
parrot/main
chrony 4.0 net vincent.debian@free.fr
Parrot
parrot-updates/main
chrony 4.0 net vincent.debian@free.fr
pkgsrc current net/chrony 4.2 net hannken@netbsd.org
PLD Linux chrony 4.2 - -
PureOS Amber chrony 3.4 Potentially vulnerable misc vincent.debian@free.fr, joodebian@joonet.de
PureOS Amber chrony 3.4 Potentially vulnerable misc vincent.debian@free.fr, joodebian@joonet.de
PureOS landing chrony 4.0 misc vincent.debian@free.fr
Raspbian Oldstable
main
chrony 3.4 Potentially vulnerable net vincent.debian@free.fr, joodebian@joonet.de
Raspbian Stable
main
chrony 4.0 net vincent.debian@free.fr
Raspbian Testing
main
chrony 4.2 net vincent.debian@free.fr
Rocky Linux 8
BaseOS
chrony 4.1 System Environment/Daemons infrastructure@rockylinux.org
Rosa 2014.1
contrib/updates
chrony 1.31.2 Potentially vulnerable - -
Rosa 2014.1
contrib/release
chrony 1.27-pre1 Potentially vulnerable - -
Rosa 2016.1
contrib/release
chrony 1.31.2 Potentially vulnerable - -
Rosa 2019.1
main/release
chrony 4.1 System/Base alexander@mezon.ru
Rosa 2019.1
contrib/release
chrony 3.5 Potentially vulnerable System/Base survolog@yandex.ru
Rosa Server 7.3
base/release
chrony 2.1.1 Potentially vulnerable System Environment/Daemons alex2048@mail.ru
Rosa Server 7.5
base/release
chrony 3.2 Potentially vulnerable System Environment/Daemons alex2048@mail.ru
Rosa Server 7.5
base/release
chrony 2.1.1 Potentially vulnerable System Environment/Daemons alex2048@mail.ru
Scientific Linux 7.x chrony 3.4 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x chrony 3.2 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x chrony 3.1 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x chrony 2.1.1 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x chrony 2.1.1 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x chrony 2.1.1 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x chrony 1.29.1 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x chrony 1.29 Potentially vulnerable System Environment/Daemons -
SlackBuilds network/chrony 4.2 network rellis@dp100.com
Spack chrony 3.5.1 - fallback-mnt-spack@repology
T2 SDE chrony 4.2 extra/network t2@t2-project.org
Trisquel 6.0
toutatis/main
chrony 1.24 Potentially vulnerable universe/admin ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 7.0
belenos/main
chrony 1.29 Potentially vulnerable universe/admin ad_debian@joonet.de
Trisquel 7.0
belenos-updates/main
chrony 1.29 Potentially vulnerable universe/admin ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 8.0
flidas/main
chrony 2.1.1 Potentially vulnerable universe/admin vincent.debian@free.fr, joodebian@joonet.de
Trisquel 8.0
flidas-updates/main
chrony 2.1.1 Potentially vulnerable universe/admin ubuntu-devel-discuss@lists.ubuntu.com, joodebian@joonet.de
Trisquel 9.0
etiona/main
chrony 3.2 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, joodebian@joonet.de
Trisquel 9.0
etiona-updates/main
chrony 3.2 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, joodebian@joonet.de
Trisquel 10.0
nabia/main
chrony 3.5 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, joodebian@joonet.de
Trisquel 10.0
nabia-updates/main
chrony 3.5 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, joodebian@joonet.de
Ubuntu 14.04
trusty/universe
chrony 1.29 Potentially vulnerable universe/admin ad_debian@joonet.de
Ubuntu 14.04
trusty-updates/universe
chrony 1.29 Potentially vulnerable universe/admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 16.04
xenial/universe
chrony 2.1.1 Potentially vulnerable universe/admin vincent.debian@free.fr, joodebian@joonet.de
Ubuntu 16.04
xenial-updates/universe
chrony 2.1.1 Potentially vulnerable universe/admin ubuntu-devel-discuss@lists.ubuntu.com, joodebian@joonet.de
Ubuntu 18.04
bionic/main
chrony 3.2 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, joodebian@joonet.de
Ubuntu 18.04
bionic-updates/main
chrony 3.2 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, joodebian@joonet.de
Ubuntu 20.04
focal/main
chrony 3.5 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, joodebian@joonet.de
Ubuntu 20.04
focal-updates/main
chrony 3.5 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, joodebian@joonet.de
Ubuntu 21.04
hirsute/main
chrony 4.0 admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 21.10
impish/main
chrony 4.1 admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 22.04
jammy/main
chrony 4.2 admin ubuntu-devel-discuss@lists.ubuntu.com
Void Linux x86_64
x86_64
chrony 4.2 - ailiop@altatus.com