<h2>Linux</h2>
<h3>New image released: Fedora 37</h3>
<ul>
<li>Standard_Fedora_37_latest </li>
</ul>
<p>default login user: linux<br />
supported OTC flavors: <a href="https://imagefactory.otc.t-systems.com/flavor-images">https://imagefactory.otc.t-systems.com/flavor-images</a> </p>
<h3>New Image Release - Red Hat Enterprise Linux 8.7</h3>
<ul>
<li>Image Name: Enterprise_RedHat_8_latest</li>
<li>Default login user: linux</li>
<li>Supported flavors: <a href="https://imagefactory.otc.t-systems.com/flavor-images">https://imagefactory.otc.t-systems.com/flavor-images</a></li>
<li>Official Red Hat certification information: <a href="https://access.redhat.com/ecosystem/cloud-provider/2774571">link</a></li>
<li>Note: authselect workaround in place for yescrypt <a href="https://bugzilla.redhat.com/show_bug.cgi" id="2151140">link1</a> and <a href="https://access.redhat.com/solutions/6989354">link2</a></li>
</ul>
<h3>New Image Release - Red Hat Enterprise Linux 9.1</h3>
<ul>
<li>Image Name: Enterprise_RedHat_9_latest</li>
<li>Default login user: linux</li>
<li>Supported flavors: <a href="https://imagefactory.otc.t-systems.com/flavor-images">https://imagefactory.otc.t-systems.com/flavor-images</a></li>
<li>Official Red Hat certification information: <a href="https://access.redhat.com/ecosystem/cloud-provider/2774571">link</a></li>
<li>Note: authselect workaround in place for yescrypt <a href="https://bugzilla.redhat.com/show_bug.cgi" id="2151140">link1</a> and <a href="https://access.redhat.com/solutions/6989354">link2</a></li>
</ul>
<h2>Windows</h2>
<h3>Updated Microsoft Windws Server Images with current Microsoft Windows Server Patches of December 2022, 14th</h3>
<ul>
<li>
<p>Windows Server 2012 R2</p>
<ul>
<li>Windows Malicious Software Removal Tool x64 - v5.108 (KB890830)</li>
<li>2022-12 Security Monthly Quality Rollup for Windows Server 2012 R2 for x64-based Systems (KB5021294)</li>
<li>2022-12 Security Only Quality Update for Windows Server 2012 R2 for x64-based Systems (KB5021296)</li>
<li>2022-12 Security Only Update for .NET Framework 3.5, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Windows Server 2012 R2 for x64 (KB5021081)</li>
</ul>
</li>
<li>
<p>Windows Server 2016</p>
<ul>
<li>Windows Malicious Software Removal Tool x64 - v5.108 (KB890830)</li>
<li>2022-12 Cumulative Update for Windows Server 2016 for x64-based Systems (KB5021235)</li>
</ul>
</li>
<li>
<p>Windows Server 2019</p>
<ul>
<li>Windows Malicious Software Removal Tool x64 - v5.108 (KB890830)</li>
<li>2022-12 Cumulative Update for Windows Server 2019 for x64-based Systems (KB5021237)</li>
<li>2022-12 Cumulative Update for .NET Framework 3.5, 4.7.2 and 4.8 for Windows Server 2019 for x64 (KB5021085)</li>
</ul>
</li>
<li>
<p>Windows Server 2022</p>
<ul>
<li>Microsoft Edge-Extended Stable Channel Version 108 Update for x64 based Editions (Build 108.0.1462.46)</li>
<li>Microsoft Edge-Stable Channel Version 108 Update for x64 based Editions (Build 108.0.1462.46)</li>
<li>Windows Malicious Software Removal Tool x64 - v5.108 (KB890830)</li>
<li>2022-12 Cumulative Update for Microsoft server operating system version 21H2 for x64-based Systems (KB5021249)</li>
<li>2022-12 Cumulative Update for .NET Framework 3.5, 4.8 and 4.8.1 for Microsoft server operating system version 21H2 for x64 (KB5021095)</li>
</ul>
</li>
<li>
<p>updated drivers and tools of all Windows Server types</p>
<ul>
<li>Cloudbase-Init: 1.1.4.dev28 </li>
<li>NVIDIA V100 / T4 driver: 474.04
<ul>
<li>fixes CVE‑2022‑34669, CVE‑2022‑34681, CVE‑2022‑34683, CVE‑2022‑42266, CVE‑2022‑34678, CVE‑2022‑34672</li>
<li>for details see <a href="https://nvidia.custhelp.com/app/answers/detail/a_id/5415">https://nvidia.custhelp.com/app/answers/detail/a_id/5415 </a></li>
</ul></li>
</ul>
</li>
<li>
<p>upchanged drivers and tools of all Windows Server types</p>
<ul>
<li>KVM UVP Vmtools: 2.5.0.156</li>
<li>Intel(R) Network Connections Software Version 27.0, February 2, 2022</li>
</ul>
</li>
</ul>