diff --git a/.gitignore b/.gitignore
index 2c8f410..076559d 100644
--- a/.gitignore
+++ b/.gitignore
@@ -1,3 +1,3 @@
 SOURCES/container-selinux.tgz
-SOURCES/selinux-policy-0d0cdeb.tar.gz
-SOURCES/selinux-policy-contrib-e792d43.tar.gz
+SOURCES/selinux-policy-contrib-ab25857.tar.gz
+SOURCES/selinux-policy-f69f5fb.tar.gz
diff --git a/.selinux-policy.metadata b/.selinux-policy.metadata
index c3dc471..df2c38e 100644
--- a/.selinux-policy.metadata
+++ b/.selinux-policy.metadata
@@ -1,3 +1,3 @@
-e1411242b32a49a25304222c69494e8260717d5f SOURCES/container-selinux.tgz
-c03b757bcbbe87d2594ababc5e4f308e606eb5cb SOURCES/selinux-policy-0d0cdeb.tar.gz
-ac5f3b3a42a97df721021ddf4636b295c7dd4c77 SOURCES/selinux-policy-contrib-e792d43.tar.gz
+066551828329d6e9ef8d90c59c1189b349fcaac2 SOURCES/container-selinux.tgz
+dd751906632af21c65978684ae2911c1e1bbdb18 SOURCES/selinux-policy-contrib-ab25857.tar.gz
+f5117817ac06eb8eee7ed9f589166a89c4329ffd SOURCES/selinux-policy-f69f5fb.tar.gz
diff --git a/SPECS/selinux-policy.spec b/SPECS/selinux-policy.spec
index ea55676..76dfa16 100644
--- a/SPECS/selinux-policy.spec
+++ b/SPECS/selinux-policy.spec
@@ -1,11 +1,11 @@
 # github repo with selinux-policy base sources
 %global git0 https://github.com/fedora-selinux/selinux-policy
-%global commit0 0d0cdebcd0a3f596318d298842d0d1c10ae646cf
+%global commit0 f69f5fbff260b71fa7c116d3253ae4f1d218dad4
 %global shortcommit0 %(c=%{commit0}; echo ${c:0:7})
 
 # github repo with selinux-policy contrib sources
 %global git1 https://github.com/fedora-selinux/selinux-policy-contrib
-%global commit1 e792d43860b96b60c4c17888670369702ee64eb2
+%global commit1 ab258574b9c3e3e3b0b4af6c5e50c2759b0daf3a
 %global shortcommit1 %(c=%{commit1}; echo ${c:0:7})
 
 %define distro redhat
@@ -29,7 +29,7 @@
 Summary: SELinux policy configuration
 Name: selinux-policy
 Version: 3.14.3
-Release: 110%{?dist}
+Release: 111%{?dist}
 License: GPLv2+
 Source: %{git0}/archive/%{commit0}/%{name}-%{shortcommit0}.tar.gz
 Source29: %{git1}/archive/%{commit1}/%{name}-contrib-%{shortcommit1}.tar.gz
@@ -717,6 +717,32 @@ exit 0
 %endif
 
 %changelog
+* Fri Nov 11 2022 Zdenek Pytela <zpytela@redhat.com> - 3.14.3-111
+- Add domain_unix_read_all_semaphores() interface
+Resolves: rhbz#2141311
+- Allow iptables list cgroup directories
+Resolves: rhbz#2134820
+- Allow systemd-hostnamed dbus chat with init scripts
+Resolves: rhbz#2111632
+- Allow systemd to read symlinks in /var/lib
+Resolves: rhbz#2118784
+- Allow insights-client domain transition on semanage execution
+Resolves: rhbz#2141311
+- Allow insights-client create gluster log dir with a transition
+Resolves: rhbz#2141311
+- Allow insights-client manage generic locks
+Resolves: rhbz#2141311
+- Allow insights-client unix_read all domain semaphores
+Resolves: rhbz#2141311
+- Allow winbind-rpcd use the terminal multiplexor
+Resolves: rhbz#2107106
+- Allow mrtg send mails
+Resolves: rhbz#2103675
+- Allow sssd dbus chat with system cronjobs
+Resolves: rhbz#2132922
+- Allow postfix/smtp and postfix/virtual read kerberos key table
+Resolves: rhbz#1983308
+
 * Thu Oct 20 2022 Zdenek Pytela <zpytela@redhat.com> - 3.14.3-110
 - Add the systemd_connectto_socket_proxyd_unix_sockets() interface
 Resolves: rhbz#208441