diff --git a/.gitignore b/.gitignore
index 3edd15a..5e57009 100644
--- a/.gitignore
+++ b/.gitignore
@@ -1,4 +1,4 @@
 SOURCES/config.tgz
 SOURCES/container-selinux.tgz
-SOURCES/selinux-policy-cdf17d1.tar.gz
+SOURCES/selinux-policy-49222dd.tar.gz
 SOURCES/selinux-policy-contrib-fa9efd6.tar.gz
diff --git a/.selinux-policy.metadata b/.selinux-policy.metadata
index a420a46..5ad45e1 100644
--- a/.selinux-policy.metadata
+++ b/.selinux-policy.metadata
@@ -1,4 +1,4 @@
 260c8b8f890ddf2aba881acc0650cc3b5b0252d1 SOURCES/config.tgz
-50557975e85ec90a1fd8c6ae52acfe8ccf889df2 SOURCES/container-selinux.tgz
-313c2620496fcda3cb2074b1afd8c23d2f9e95df SOURCES/selinux-policy-cdf17d1.tar.gz
+69447b732dc767c5e1b63b3961f652c7f681747d SOURCES/container-selinux.tgz
+c00ffb50bdd7ad1c165a991710251d84ddba88f8 SOURCES/selinux-policy-49222dd.tar.gz
 c8f09587ad2da0bcab0b137bb1a5d23ee639a16d SOURCES/selinux-policy-contrib-fa9efd6.tar.gz
diff --git a/SPECS/selinux-policy.spec b/SPECS/selinux-policy.spec
index 1092e9a..7e0d36b 100644
--- a/SPECS/selinux-policy.spec
+++ b/SPECS/selinux-policy.spec
@@ -1,6 +1,6 @@
 # github repo with selinux-policy base sources
 %global git0 https://github.com/fedora-selinux/selinux-policy
-%global commit0 cdf17d1b5ecc23116afce37c956f1d24dedde450
+%global commit0 49222dd20c1712a7a9aba791f0627025845a24c3
 %global shortcommit0 %(c=%{commit0}; echo ${c:0:7})
 
 # github repo with selinux-policy contrib sources
@@ -29,7 +29,7 @@
 Summary: SELinux policy configuration
 Name: selinux-policy
 Version: 3.14.1
-Release: 61%{?dist}
+Release: 61%{?dist}.1
 License: GPLv2+
 Group: System Environment/Base
 Source: %{git0}/archive/%{commit0}/%{name}-%{shortcommit0}.tar.gz
@@ -719,6 +719,10 @@ exit 0
 %endif
 
 %changelog
+* Fri May 10 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.1-61.1
+- Allow unconfined users to use smc unlabeled sockets
+Resolves: rhbz#1708098
+
 * Fri Feb 22 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.1-61
 - Add dac_override capability for sbd_t SELinux domain
 Resolves: rhbz#1677325