diff --git a/.gitignore b/.gitignore
index 1e4fce9..d75e5f2 100644
--- a/.gitignore
+++ b/.gitignore
@@ -1,3 +1,3 @@
 SOURCES/container-selinux.tgz
-SOURCES/selinux-policy-8d1a96d.tar.gz
-SOURCES/selinux-policy-contrib-f3211b5.tar.gz
+SOURCES/selinux-policy-contrib-e3c03e4.tar.gz
+SOURCES/selinux-policy-effdd23.tar.gz
diff --git a/.selinux-policy.metadata b/.selinux-policy.metadata
index 1174075..9ddbe72 100644
--- a/.selinux-policy.metadata
+++ b/.selinux-policy.metadata
@@ -1,3 +1,3 @@
-06478bf63e74d423c31bb0c53edf719f7df63ddc SOURCES/container-selinux.tgz
-832cd73e46beab5d8046c7b3a5754c645edd1634 SOURCES/selinux-policy-8d1a96d.tar.gz
-eb1855b018df25e33ef7234048c32acc58d4df0b SOURCES/selinux-policy-contrib-f3211b5.tar.gz
+01b31e9eb4c0533c3d3fd038491019bf5d3106b1 SOURCES/container-selinux.tgz
+1e4cb4ec9efe860b79c3f808c2e924ba097e782d SOURCES/selinux-policy-contrib-e3c03e4.tar.gz
+69e55f852e33da3fa5c0d70114c6f914fc045c12 SOURCES/selinux-policy-effdd23.tar.gz
diff --git a/SPECS/selinux-policy.spec b/SPECS/selinux-policy.spec
index 186c4cd..3fc693a 100644
--- a/SPECS/selinux-policy.spec
+++ b/SPECS/selinux-policy.spec
@@ -1,11 +1,11 @@
 # github repo with selinux-policy base sources
 %global git0 https://github.com/fedora-selinux/selinux-policy
-%global commit0 8d1a96d5f0e72ebf7a3f5f5930db644af91e4abe
+%global commit0 effdd23f8748163ce2be792f03a388847b14dcfd
 %global shortcommit0 %(c=%{commit0}; echo ${c:0:7})
 
 # github repo with selinux-policy contrib sources
 %global git1 https://github.com/fedora-selinux/selinux-policy-contrib
-%global commit1 f3211b540925d040fb1d21b4ff33ea65119169a6
+%global commit1 e3c03e4dc77565c5377765b4ec52c17197e4a1f4
 %global shortcommit1 %(c=%{commit1}; echo ${c:0:7})
 
 %define distro redhat
@@ -29,7 +29,7 @@
 Summary: SELinux policy configuration
 Name: selinux-policy
 Version: 3.14.3
-Release: 56%{?dist}
+Release: 57%{?dist}
 License: GPLv2+
 Source: %{git0}/archive/%{commit0}/%{name}-%{shortcommit0}.tar.gz
 Source29: %{git1}/archive/%{commit1}/%{name}-contrib-%{shortcommit1}.tar.gz
@@ -715,6 +715,24 @@ exit 0
 %endif
 
 %changelog
+* Tue Nov 24 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.3-57
+- Allow dovecot bind to smtp ports
+Resolves: rhbz#1881884
+- Change fetchmail temporary files path to /var/spool/mail
+Resolves: rhbz#1853389
+- Set file context for symlinks in /etc/httpd to etc_t
+Resolves: rhbz#1900650
+- Allow dnsmasq read public files
+Resolves: rhbz#1782539
+- Fix range for unreserved ports
+Resolves: rhbz#1794531
+- Introduce logging_syslogd_append_public_content tunable
+Resolves: rhbz#1823672
+- Add files_search_non_security_dirs() interface
+Resolves: rhbz#1823672
+- Add miscfiles_append_public_files() interface
+Resolves: rhbz#1823672
+
 * Thu Nov 12 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.3-56
 - Let keepalived bind a raw socket
 Resolves: rhbz#1895130