diff --git a/.gitignore b/.gitignore
index 47fda6f..dbaa3cc 100644
--- a/.gitignore
+++ b/.gitignore
@@ -1,3 +1,3 @@
 SOURCES/container-selinux.tgz
-SOURCES/selinux-policy-b422cb9.tar.gz
-SOURCES/selinux-policy-contrib-5fa0471.tar.gz
+SOURCES/selinux-policy-48e6bd1.tar.gz
+SOURCES/selinux-policy-contrib-64f9284.tar.gz
diff --git a/.selinux-policy.metadata b/.selinux-policy.metadata
index efce996..4f0b760 100644
--- a/.selinux-policy.metadata
+++ b/.selinux-policy.metadata
@@ -1,3 +1,3 @@
-c0b044a86a0e15563d7fe89e29e9a561225d04d1 SOURCES/container-selinux.tgz
-8134360c1345ffa270e1e74547a483e11c2eb5d7 SOURCES/selinux-policy-b422cb9.tar.gz
-de04b70b22842d36b95fa2df21ef538dede5e749 SOURCES/selinux-policy-contrib-5fa0471.tar.gz
+7861115fabe379f0a365e06caad014a257053acd SOURCES/container-selinux.tgz
+a4874ef1ad40b411afbf8f7b60cb5743c25f9dfc SOURCES/selinux-policy-48e6bd1.tar.gz
+6fa7fbf2c20d63c28739da34c2548335f8bfcae5 SOURCES/selinux-policy-contrib-64f9284.tar.gz
diff --git a/SPECS/selinux-policy.spec b/SPECS/selinux-policy.spec
index 28cc7f9..823640b 100644
--- a/SPECS/selinux-policy.spec
+++ b/SPECS/selinux-policy.spec
@@ -1,11 +1,11 @@
 # github repo with selinux-policy base sources
 %global git0 https://github.com/fedora-selinux/selinux-policy
-%global commit0 b422cb99c935d1409cccb7448fdad92ff08cb0a6
+%global commit0 48e6bd17b23e4dc87167a0060965fe8e0fadae4f
 %global shortcommit0 %(c=%{commit0}; echo ${c:0:7})
 
 # github repo with selinux-policy contrib sources
 %global git1 https://github.com/fedora-selinux/selinux-policy-contrib
-%global commit1 5fa0471a9428d7dbd65139e3f85e66e81f4aa27c
+%global commit1 64f9284bc5c3b2ad3e9e56fac9f2daf8da75b58f
 %global shortcommit1 %(c=%{commit1}; echo ${c:0:7})
 
 %define distro redhat
@@ -29,7 +29,7 @@
 Summary: SELinux policy configuration
 Name: selinux-policy
 Version: 3.14.3
-Release: 77%{?dist}
+Release: 78%{?dist}
 License: GPLv2+
 Source: %{git0}/archive/%{commit0}/%{name}-%{shortcommit0}.tar.gz
 Source29: %{git1}/archive/%{commit1}/%{name}-contrib-%{shortcommit1}.tar.gz
@@ -715,6 +715,24 @@ exit 0
 %endif
 
 %changelog
+* Wed Aug 25 2021 Zdenek Pytela <zpytela@redhat.com> - 3.14.3-78
+- Label /usr/bin/Xwayland with xserver_exec_t
+Resolves: rhbz#1984584
+- Label /usr/libexec/gdm-runtime-config with xdm_exec_t
+Resolves: rhbz#1984584
+- Allow D-bus communication between avahi and sosreport
+Resolves: rhbz#1916397
+- Allow lldpad send to kdumpctl over a unix dgram socket
+Resolves: rhbz#1979121
+- Revert "Allow lldpad send to kdump over a unix dgram socket"
+Resolves: rhbz#1979121
+- Allow chronyc respond to a user chronyd instance
+Resolves: rhbz#1993104
+- Allow ptp4l respond to pmc
+Resolves: rhbz#1993104
+- Allow lldpad send to unconfined_t over a unix dgram socket
+Resolves: rhbz#1993270
+
 * Thu Aug 12 2021 Zdenek Pytela <zpytela@redhat.com> - 3.14.3-77
 - Revert "update libs_filetrans_named_content() to have support for /usr/lib/debug directory"
 Resolves: rhbz#1887739