diff --git a/.gitignore b/.gitignore
index 6322080..2c8f410 100644
--- a/.gitignore
+++ b/.gitignore
@@ -1,3 +1,3 @@
 SOURCES/container-selinux.tgz
-SOURCES/selinux-policy-cc2eddb.tar.gz
-SOURCES/selinux-policy-contrib-425f663.tar.gz
+SOURCES/selinux-policy-0d0cdeb.tar.gz
+SOURCES/selinux-policy-contrib-e792d43.tar.gz
diff --git a/.selinux-policy.metadata b/.selinux-policy.metadata
index 3bbdbf6..c3dc471 100644
--- a/.selinux-policy.metadata
+++ b/.selinux-policy.metadata
@@ -1,3 +1,3 @@
-95220354bd89f8c0623f31873b33007620425091 SOURCES/container-selinux.tgz
-822cb1f2d37032a6556891bbf749a652f2f8428a SOURCES/selinux-policy-cc2eddb.tar.gz
-c3dbbf00ada862eaf2171a59963aef458ea908a0 SOURCES/selinux-policy-contrib-425f663.tar.gz
+e1411242b32a49a25304222c69494e8260717d5f SOURCES/container-selinux.tgz
+c03b757bcbbe87d2594ababc5e4f308e606eb5cb SOURCES/selinux-policy-0d0cdeb.tar.gz
+ac5f3b3a42a97df721021ddf4636b295c7dd4c77 SOURCES/selinux-policy-contrib-e792d43.tar.gz
diff --git a/SPECS/selinux-policy.spec b/SPECS/selinux-policy.spec
index 432ba02..ea55676 100644
--- a/SPECS/selinux-policy.spec
+++ b/SPECS/selinux-policy.spec
@@ -1,11 +1,11 @@
 # github repo with selinux-policy base sources
 %global git0 https://github.com/fedora-selinux/selinux-policy
-%global commit0 cc2eddb61e0f14acf9b54f19cfb0d157b3f6025b
+%global commit0 0d0cdebcd0a3f596318d298842d0d1c10ae646cf
 %global shortcommit0 %(c=%{commit0}; echo ${c:0:7})
 
 # github repo with selinux-policy contrib sources
 %global git1 https://github.com/fedora-selinux/selinux-policy-contrib
-%global commit1 425f6638e4f6a8b26439fa838a6ddc3e4a85e535
+%global commit1 e792d43860b96b60c4c17888670369702ee64eb2
 %global shortcommit1 %(c=%{commit1}; echo ${c:0:7})
 
 %define distro redhat
@@ -29,7 +29,7 @@
 Summary: SELinux policy configuration
 Name: selinux-policy
 Version: 3.14.3
-Release: 109%{?dist}
+Release: 110%{?dist}
 License: GPLv2+
 Source: %{git0}/archive/%{commit0}/%{name}-%{shortcommit0}.tar.gz
 Source29: %{git1}/archive/%{commit1}/%{name}-contrib-%{shortcommit1}.tar.gz
@@ -717,6 +717,34 @@ exit 0
 %endif
 
 %changelog
+* Thu Oct 20 2022 Zdenek Pytela <zpytela@redhat.com> - 3.14.3-110
+- Add the systemd_connectto_socket_proxyd_unix_sockets() interface
+Resolves: rhbz#208441
+- Add the dev_map_vhost() interface
+Resolves: rhbz#2122920
+- Allow init remount all file_type filesystems
+Resolves: rhbz#2122239
+- added policy for systemd-socket-proxyd
+Resolves: rhbz#2088441
+- Allow virt_domain map vhost devices
+Resolves: rhbz#2122920
+- Allow virt domains to access xserver devices
+Resolves: rhbz#2122920
+- Allow rotatelogs read httpd_log_t symlinks
+Resolves: rhbz#2030633
+- Allow vlock search the contents of the /dev/pts directory
+Resolves: rhbz#2122838
+- Allow system cronjobs dbus chat with setroubleshoot
+Resolves: rhbz#2125008
+- Allow ptp4l_t name_bind ptp_event_port_t
+Resolves: rhbz#2130168
+- Allow pcp_domain execute its private memfd: objects
+Resolves: rhbz#2090711
+- Allow samba-dcerpcd use NSCD services over a unix stream socket
+Resolves: rhbz#2121709
+- Allow insights-client manage samba var dirs
+Resolves: rhbz#2132230
+
 * Wed Oct 12 2022 Zdenek Pytela <zpytela@redhat.com> - 3.14.3-109
 - Add the files_map_read_etc_files() interface
 Resolves: rhbz#2132230