diff --git a/.gitignore b/.gitignore
index 252408f..ef94815 100644
--- a/.gitignore
+++ b/.gitignore
@@ -1,3 +1,3 @@
 SOURCES/container-selinux.tgz
-SOURCES/selinux-policy-1aa8a0e.tar.gz
-SOURCES/selinux-policy-contrib-4edd823.tar.gz
+SOURCES/selinux-policy-69f08ca.tar.gz
+SOURCES/selinux-policy-contrib-58ad0c6.tar.gz
diff --git a/.selinux-policy.metadata b/.selinux-policy.metadata
index 8750686..40294ae 100644
--- a/.selinux-policy.metadata
+++ b/.selinux-policy.metadata
@@ -1,3 +1,3 @@
-816e9fafc89d3e15db6675cbda54f34b18b0e5f9 SOURCES/container-selinux.tgz
-0965955a2b5f2c0e227f0cbafd2628b860d4728f SOURCES/selinux-policy-1aa8a0e.tar.gz
-9066c165077809df6abfcbacf5da30a482e9b62d SOURCES/selinux-policy-contrib-4edd823.tar.gz
+c756a5380431581b13d6c68417202e00015a7ef7 SOURCES/container-selinux.tgz
+8a5ddc921e8fdcf4b4aa42d472d064e3b64ef414 SOURCES/selinux-policy-69f08ca.tar.gz
+7bc2148eecd91474263b434a411e26732319fe6f SOURCES/selinux-policy-contrib-58ad0c6.tar.gz
diff --git a/SPECS/selinux-policy.spec b/SPECS/selinux-policy.spec
index 577629b..f52de9b 100644
--- a/SPECS/selinux-policy.spec
+++ b/SPECS/selinux-policy.spec
@@ -1,11 +1,11 @@
 # github repo with selinux-policy base sources
 %global git0 https://github.com/fedora-selinux/selinux-policy
-%global commit0 1aa8a0e438335c2a5a26350c2dcb180447985f3f
+%global commit0 69f08cae339813fbcaaad35e75a033f7ecd66037
 %global shortcommit0 %(c=%{commit0}; echo ${c:0:7})
 
 # github repo with selinux-policy contrib sources
 %global git1 https://github.com/fedora-selinux/selinux-policy-contrib
-%global commit1 4edd823afd43e6e576de2a9f738e686ab485dcc8
+%global commit1 58ad0c627362a116b66219ac502261b07800e898
 %global shortcommit1 %(c=%{commit1}; echo ${c:0:7})
 
 %define distro redhat
@@ -29,7 +29,7 @@
 Summary: SELinux policy configuration
 Name: selinux-policy
 Version: 3.14.3
-Release: 113%{?dist}
+Release: 114%{?dist}
 License: GPLv2+
 Source: %{git0}/archive/%{commit0}/%{name}-%{shortcommit0}.tar.gz
 Source29: %{git1}/archive/%{commit1}/%{name}-contrib-%{shortcommit1}.tar.gz
@@ -717,6 +717,24 @@ exit 0
 %endif
 
 %changelog
+* Thu Jan 12 2023 Zdenek Pytela <zpytela@redhat.com> - 3.14.3-114
+- Add interfaces in domain, files, and unconfined modules
+Resolves: rhbz#2141311
+- Allow sysadm_t read/write ipmi devices
+Resolves: rhbz#2148561
+- Allow sudodomain use sudo.log as a logfile
+Resolves: rhbz#2143762
+- Add insights additional capabilities
+Resolves: rhbz#2158779
+- Allow insights client work with gluster and pcp
+Resolves: rhbz#2141311
+- Allow prosody manage its runtime socket files
+Resolves: rhbz#2157902
+- Allow system mail service read inherited certmonger runtime files
+Resolves: rhbz#2143337
+- Add lpr_roles  to system_r roles
+Resolves: rhbz#2151111
+
 * Thu Dec 15 2022 Zdenek Pytela <zpytela@redhat.com> - 3.14.3-113
 - Allow systemd-socket-proxyd get attributes of cgroup filesystems
 Resolves: rhbz#2088441