diff --git a/.gitignore b/.gitignore
index 05455f1..f6232f5 100644
--- a/.gitignore
+++ b/.gitignore
@@ -298,3 +298,5 @@ serefpolicy*
 /selinux-policy-contrib-23a0603.tar.gz
 /selinux-policy-d616286.tar.gz
 /selinux-policy-contrib-bfc11d6.tar.gz
+/selinux-policy-cc3def4.tar.gz
+/selinux-policy-contrib-f0ca657.tar.gz
diff --git a/selinux-policy.spec b/selinux-policy.spec
index c39cc7c..251ff48 100644
--- a/selinux-policy.spec
+++ b/selinux-policy.spec
@@ -1,11 +1,11 @@
 # github repo with selinux-policy base sources
 %global git0 https://github.com/fedora-selinux/selinux-policy
-%global commit0 d61628691715136c744f049f4d61aeeec3c0d9fa
+%global commit0 cc3def49862b7cea6b321bdc1cd8bb9b715e7ffc
 %global shortcommit0 %(c=%{commit0}; echo ${c:0:7})
 
 # github repo with selinux-policy contrib sources
 %global git1 https://github.com/fedora-selinux/selinux-policy-contrib
-%global commit1 bfc11d6bd418bc719015ea876365d2f894e18499
+%global commit1 f0ca657fd17cb4c77bb1d7ee4422f94e397e7ac3
 %global shortcommit1 %(c=%{commit1}; echo ${c:0:7})
 
 %define distro redhat
@@ -29,7 +29,7 @@
 Summary: SELinux policy configuration
 Name: selinux-policy
 Version: 3.14.2
-Release: 28%{?dist}
+Release: 29%{?dist}
 License: GPLv2+
 Group: System Environment/Base
 Source: %{git0}/archive/%{commit0}/%{name}-%{shortcommit0}.tar.gz
@@ -709,6 +709,47 @@ exit 0
 %endif
 
 %changelog
+* Wed Jul 25 2018 Lukas Vrabec <lvrabec@redhat.com> - 3.14.2-29
+- Allow aide to mmap all files
+- Revert "Allow firewalld to create rawip sockets"
+- Revert "Allow firewalld_t do read iptables_var_run_t files"
+- Allow svirt_tcg_t domain to read system state of virtd_t domains
+- Update rhcs contexts to reflects the latest fenced changes
+- Allow httpd_t domain to rw user_tmp_t files
+- Fix typo in openct policy
+- Allow winbind_t domian to connect to all ephemeral ports
+- Allow firewalld_t do read iptables_var_run_t files
+- Allow abrt_t domain to mmap data_home files
+- Allow glusterd_t domain to mmap user_tmp_t files
+- Allow mongodb_t domain to mmap own var_lib_t files
+- Allow firewalld to read kernel usermodehelper state
+- Allow modemmanager_t to read sssd public files
+- Allow openct_t domain to mmap own var_run_t files
+- Allow nnp transition for devicekit daemons
+- Allow firewalld to create rawip sockets
+- Allow firewalld to getattr proc filesystem
+- Dontaudit sys_admin capability for pcscd_t domain
+- Revert "Allow pcsd_t domain sys_admin capability"
+- Allow fetchmail_t domain to stream connect to sssd
+- Allow pcsd_t domain sys_admin capability
+- Allow cupsd_t to create cupsd_etc_t dirs
+- Allow varnishlog_t domain to list varnishd_var_lib_t dirs
+- Allow mongodb_t domain to read system network state BZ(1599230)
+- Allow tgtd_t domain to create dirs in /var/run labeled as tgtd_var_run_t BZ(1492377)
+- Allow iscsid_t domain to mmap sysfs_t files
+- Allow httpd_t domain to mmap own cache files
+- Add sys_resource capability to nslcd_t domain
+- Fixed typo in logging_audisp_domain interface
+- Add interface files_mmap_all_files()
+- Add interface iptables_read_var_run()
+- Allow systemd to mounton init_var_run_t files
+- Update policy rules for auditd_t based on changes in audit version 3
+- Allow systemd_tmpfiles_t do mmap system db files
+- Merge branch 'rawhide' of github.com:fedora-selinux/selinux-policy into rawhide
+- Improve domain_transition_pattern to allow mmap entrypoint bin file.
+- Don't setup unlabeled_t as an entry_type
+- Allow unconfined_service_t to transition to container_runtime_t
+
 * Wed Jul 18 2018 Lukas Vrabec <lvrabec@redhat.com> - 3.14.2-28
 - Allow cupsd_t domain to mmap cupsd_etc_t files
 - Allow kadmind_t domain to mmap krb5kdc_principal_t
diff --git a/sources b/sources
index f1f5831..4538ddc 100644
--- a/sources
+++ b/sources
@@ -1,3 +1,3 @@
-SHA512 (container-selinux.tgz) = c7a65ac9b50b465201c405fdac721e2b92e6bfded2c49a9027e1df6fb036730113fbdfa5cce8394fe73e6f0eff371e5bbf4b0e1535b2311b8627696669485ba3
-SHA512 (selinux-policy-d616286.tar.gz) = 2e318cb95da9501b64a46488b9561fea4d7399a5167dc0f78a45876ab450a702e4c2eea6270dd9221ce38bfa205f0394f1eda776219e8b8297828ff5290d868f
-SHA512 (selinux-policy-contrib-bfc11d6.tar.gz) = 7d9e256113afb862de2eac4a4594f08e7f91a0455db1106756cec20546e8404b8d235c3b0a15b48f46348a9492de282521143a1ecf84a79a037e19476f6ad3f1
+SHA512 (container-selinux.tgz) = 2ff3997f7953d99be29fd59a004045e8650771c19c75bd4b4fb5ba9ee7e6f579ad68d8f2174ddc875d3281536b5dc19da950d43aaf552d5d49fee03a18ee5bf1
+SHA512 (selinux-policy-cc3def4.tar.gz) = 76f28dedea25e0ab187dc18d4aa316705cf46b4c2b93477f52c86e8781be2bd31edacb6161dbeeca667eaa7218fbab139aac25bf06288624727d840e42e82617
+SHA512 (selinux-policy-contrib-f0ca657.tar.gz) = 124f6b2bc63ee343ddc4acc75580d34af27a9f2491f6638f7f17fa612abc322a17ddbb4a36d2aa492044cf13950defc05ba8f5f42c52640feb7c6c81177f1d38