diff --git a/SOURCES/ovt-Properly-check-authorization-on-incoming-guestOps-re.patch b/SOURCES/ovt-Properly-check-authorization-on-incoming-guestOps-re.patch
new file mode 100644
index 0000000..9eca918
--- /dev/null
+++ b/SOURCES/ovt-Properly-check-authorization-on-incoming-guestOps-re.patch
@@ -0,0 +1,57 @@
+From 78c066aa4912d8ccea958dffc39a73667c9979c6 Mon Sep 17 00:00:00 2001
+From: Cathy Avery <cavery@redhat.com>
+Date: Mon, 29 Aug 2022 12:50:45 -0400
+Subject: [PATCH] Properly check authorization on incoming guestOps requests.
+
+RH-Author: Cathy Avery <cavery@redhat.com>
+RH-MergeRequest: 11: Properly check authorization on incoming guestOps requests.
+RH-Bugzilla: 2119283
+RH-Acked-by: Mohamed Gamal Morsy <mmorsy@redhat.com>
+RH-Acked-by: Miroslav Rezanina <mrezanin@redhat.com>
+RH-Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
+RH-Commit: [1/1] 546959f6b3546cc19ff844041ff363ea46793d6c
+Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=2119283
+Brew: https://brewweb.engineering.redhat.com/brew/taskinfo?taskID=47491717
+Tested: Tested by QE
+Upstream Status: origin/master
+Conflicts: None
+
+    commit 70a74758bfe0042c27f15ce590fb21a2bc54d745
+    Author: John Wolfe <jwolfe@vmware.com>
+    Date:   Sun Aug 21 07:56:49 2022 -0700
+
+    Properly check authorization on incoming guestOps requests.
+
+    Fix public pipe request checks.  Only a SessionRequest type should
+    be accepted on the public pipe.
+
+Signed-off-by: Cathy Avery <cavery@redhat.com>
+---
+ vgauth/serviceImpl/proto.c | 6 +++++-
+ 1 file changed, 5 insertions(+), 1 deletion(-)
+
+diff --git a/open-vm-tools/vgauth/serviceImpl/proto.c b/open-vm-tools/vgauth/serviceImpl/proto.c
+index db7159ee..6c672601 100644
+--- a/open-vm-tools/vgauth/serviceImpl/proto.c
++++ b/open-vm-tools/vgauth/serviceImpl/proto.c
+@@ -1,5 +1,5 @@
+ /*********************************************************
+- * Copyright (C) 2011-2016,2019-2021 VMware, Inc. All rights reserved.
++ * Copyright (C) 2011-2016,2019-2022 VMware, Inc. All rights reserved.
+  *
+  * This program is free software; you can redistribute it and/or modify it
+  * under the terms of the GNU Lesser General Public License as published
+@@ -1201,6 +1201,10 @@ Proto_SecurityCheckRequest(ServiceConnection *conn,
+    VGAuthError err;
+    gboolean isSecure = ServiceNetworkIsConnectionPrivateSuperUser(conn);
+ 
++   if (conn->isPublic && req->reqType != PROTO_REQUEST_SESSION_REQ) {
++      return VGAUTH_E_PERMISSION_DENIED;
++   }
++
+    switch (req->reqType) {
+       /*
+        * This comes over the public connection; alwsys let it through.
+-- 
+2.35.3
+
diff --git a/SPECS/open-vm-tools.spec b/SPECS/open-vm-tools.spec
index 37fa2d7..9edd5e6 100644
--- a/SPECS/open-vm-tools.spec
+++ b/SPECS/open-vm-tools.spec
@@ -32,7 +32,7 @@
 
 Name:             open-vm-tools
 Version:          %{toolsversion}
-Release:          1%{?dist}
+Release:          1%{?dist}.1
 Summary:          Open Virtual Machine Tools for virtual machines hosted on VMware
 License:          GPLv2
 URL:              https://github.com/vmware/%{name}
@@ -44,6 +44,8 @@ Source3:          run-vmblock\x2dfuse.mount
 Source4:          open-vm-tools.conf
 Source5:          vmtoolsd.pam
 
+# For bz#2119283 - CVE-2022-31676 open-vm-tools: local root privilege escalation in the virtual machine [rhel-8.6.0.z]
+Patch1: ovt-Properly-check-authorization-on-incoming-guestOps-re.patch
 
 %if 0%{?rhel} >= 7
 ExclusiveArch:    x86_64
@@ -389,6 +391,11 @@ fi
 %{_bindir}/vmware-vgauth-smoketest
 
 %changelog
+* Fri Sep 02 2022 Jon Maloy <jmaloy@redhat.com> - 11.3.5-1.el8_6.1
+- ovt-Properly-check-authorization-on-incoming-guestOps-re.patch [bz#2119283]
+- Resolves: bz#2119283
+  (CVE-2022-31676 open-vm-tools: local root privilege escalation in the virtual machine [rhel-8.6.0.z])
+
 * Mon Oct 18 2021 Miroslav Rezanian <mrezanin@redhat.com> - 11.3.5-1.el9
 - Rebase to open-vm-tools 11.3.5 [bz#2008244]
 - Resolves: bz#2008244