diff --git a/.gitignore b/.gitignore
index da81579..ce02cfc 100644
--- a/.gitignore
+++ b/.gitignore
@@ -1,2 +1,2 @@
 SOURCES/container-selinux.tgz
-SOURCES/selinux-policy-23a8268.tar.gz
+SOURCES/selinux-policy-cd12132.tar.gz
diff --git a/.selinux-policy.metadata b/.selinux-policy.metadata
index e4f9a4c..dc91e5c 100644
--- a/.selinux-policy.metadata
+++ b/.selinux-policy.metadata
@@ -1,2 +1,2 @@
-2404b329e467495ccb771593ba306eb043932ffa SOURCES/container-selinux.tgz
-6329655722127a03a53c33d3c02f72df4246e718 SOURCES/selinux-policy-23a8268.tar.gz
+d0aca979f362bc05881a734928a1fa223f6c8ec0 SOURCES/container-selinux.tgz
+acd5572c0a5c94147bc1746b9ad6dac18f4c8bef SOURCES/selinux-policy-cd12132.tar.gz
diff --git a/SPECS/selinux-policy.spec b/SPECS/selinux-policy.spec
index 599d8f4..cf31fd6 100644
--- a/SPECS/selinux-policy.spec
+++ b/SPECS/selinux-policy.spec
@@ -1,6 +1,6 @@
 # github repo with selinux-policy sources
 %global giturl https://github.com/fedora-selinux/selinux-policy
-%global commit 23a8268b99a25d662dda2ccbcf41d71e1d028fe9
+%global commit cd12132eaba9e20fd05aa30f4aa201a39607feab
 %global shortcommit %(c=%{commit}; echo ${c:0:7})
 
 %define distro redhat
@@ -24,7 +24,7 @@
 Summary: SELinux policy configuration
 Name: selinux-policy
 Version: 34.1.43
-Release: 1%{?dist}
+Release: 1%{?dist}.1
 License: GPLv2+
 Source: %{giturl}/archive/%{commit}/%{name}-%{shortcommit}.tar.gz
 Source1: modules-targeted-base.conf
@@ -794,6 +794,46 @@ exit 0
 %endif
 
 %changelog
+* Fri Jan 06 2023 Nikola Knazekova <nknazeko@redhat.com> - 34.1.43-1.1
+- Add domain_unix_read_all_semaphores() interface
+Resolves: rhbz#2136760
+- Allow rhcd compute selinux access vector
+Resolves: rhbz#2136760
+- Add file context entries for insights-client and rhc
+Resolves: rhbz#2136760
+- Revert "Allow insights-client run lpr and allow the proper role"
+Resolves: rhbz#2136760
+- Allow insights-client dbus chat with various services
+Resolves: rhbz#2136760
+- Allow insights-client tcp connect to various ports
+Resolves: rhbz#2136760
+- Allow insights-client run lpr and allow the proper role
+Resolves: rhbz#2136760
+- Allow insights-client work with pcp and manage user config files
+Resolves: rhbz#2136760
+- Allow insights-client dbus chat with abrt
+Resolves: rhbz#2136760
+- Allow insights client communicate with cupsd, mysqld, openvswitch, redis
+Resolves: rhbz#2136760
+- Allow insights client read raw memory devices
+Resolves: rhbz#2136760
+- Allow insights-client domain transition on semanage execution
+Resolves: rhbz#2136760
+- Allow insights-client create gluster log dir with a transition
+Resolves: rhbz#2136760
+- Allow insights-client manage generic locks
+Resolves: rhbz#2136760
+- Allow insights-client unix_read all domain semaphores
+Resolves: rhbz#2136760
+- Allow insights-client manage samba var dirs
+Resolves: rhbz#2136760
+- Allow insights-client send null signal to rpm and system cronjob
+Resolves: rhbz#2136760
+- Allow insights-client connect to postgresql with a unix socket
+Resolves: rhbz#2136760
+- Allow insights-client domtrans on unix_chkpwd execution
+Resolves: rhbz#2136760
+
 * Thu Sep 08 2022 Zdenek Pytela <zpytela@redhat.com> - 34.1.43-1 
 - Update rhcd policy for executing additional commands 5
 Resolves: rhbz#2119351