diff --git a/.gitignore b/.gitignore
index cb4bd4f..6322080 100644
--- a/.gitignore
+++ b/.gitignore
@@ -1,3 +1,3 @@
 SOURCES/container-selinux.tgz
-SOURCES/selinux-policy-76d3f46.tar.gz
-SOURCES/selinux-policy-contrib-f71a764.tar.gz
+SOURCES/selinux-policy-cc2eddb.tar.gz
+SOURCES/selinux-policy-contrib-425f663.tar.gz
diff --git a/.selinux-policy.metadata b/.selinux-policy.metadata
index 8b25f61..3bbdbf6 100644
--- a/.selinux-policy.metadata
+++ b/.selinux-policy.metadata
@@ -1,3 +1,3 @@
-630fb93dc3f0c54c9bac3e9e29742b235e3d3226 SOURCES/container-selinux.tgz
-868d9fd6e2fed0794a9a7b698586a5419d97cb7e SOURCES/selinux-policy-76d3f46.tar.gz
-fe5e8136583726cb626ba6eacc7c148df57926a7 SOURCES/selinux-policy-contrib-f71a764.tar.gz
+95220354bd89f8c0623f31873b33007620425091 SOURCES/container-selinux.tgz
+822cb1f2d37032a6556891bbf749a652f2f8428a SOURCES/selinux-policy-cc2eddb.tar.gz
+c3dbbf00ada862eaf2171a59963aef458ea908a0 SOURCES/selinux-policy-contrib-425f663.tar.gz
diff --git a/SPECS/selinux-policy.spec b/SPECS/selinux-policy.spec
index 8f5bb4e..432ba02 100644
--- a/SPECS/selinux-policy.spec
+++ b/SPECS/selinux-policy.spec
@@ -1,11 +1,11 @@
 # github repo with selinux-policy base sources
 %global git0 https://github.com/fedora-selinux/selinux-policy
-%global commit0 76d3f46c6576aa301aef3702c1c30739f506691f
+%global commit0 cc2eddb61e0f14acf9b54f19cfb0d157b3f6025b
 %global shortcommit0 %(c=%{commit0}; echo ${c:0:7})
 
 # github repo with selinux-policy contrib sources
 %global git1 https://github.com/fedora-selinux/selinux-policy-contrib
-%global commit1 f71a76424ebaf8e8af3896bc758cfe10b9102892
+%global commit1 425f6638e4f6a8b26439fa838a6ddc3e4a85e535
 %global shortcommit1 %(c=%{commit1}; echo ${c:0:7})
 
 %define distro redhat
@@ -29,7 +29,7 @@
 Summary: SELinux policy configuration
 Name: selinux-policy
 Version: 3.14.3
-Release: 108%{?dist}
+Release: 109%{?dist}
 License: GPLv2+
 Source: %{git0}/archive/%{commit0}/%{name}-%{shortcommit0}.tar.gz
 Source29: %{git1}/archive/%{commit1}/%{name}-contrib-%{shortcommit1}.tar.gz
@@ -717,6 +717,28 @@ exit 0
 %endif
 
 %changelog
+* Wed Oct 12 2022 Zdenek Pytela <zpytela@redhat.com> - 3.14.3-109
+- Add the files_map_read_etc_files() interface
+Resolves: rhbz#2132230
+- Allow insights-client manage samba var dirs
+Resolves: rhbz#2132230
+- Allow insights-client send null signal to rpm and system cronjob
+Resolves: rhbz#2132230
+- Update rhcd policy for executing additional commands 4
+Resolves: rhbz#2132230
+- Allow insights-client connect to postgresql with a unix socket
+Resolves: rhbz#2132230
+- Allow insights-client domtrans on unix_chkpwd execution
+Resolves: rhbz#2132230
+- Add file context entries for insights-client and rhc
+Resolves: rhbz#2132230
+- Allow snmpd_t domain to trace processes in user namespace
+Resolves: rhbz#2121084
+- Allow sbd the sys_ptrace capability
+Resolves: rhbz#2124552
+- Allow pulseaudio create gnome content (~/.config)
+Resolves: rhbz#2124387
+
 * Thu Sep 08 2022 Zdenek Pytela <zpytela@redhat.com> - 3.14.3-108
 - Allow unconfined_service_t insights client content filetrans
 Resolves: rhbz#2119507