diff --git a/.gitignore b/.gitignore
index 02d8877..c350877 100644
--- a/.gitignore
+++ b/.gitignore
@@ -1,3 +1,3 @@
 SOURCES/container-selinux.tgz
-SOURCES/selinux-policy-2049cb7.tar.gz
-SOURCES/selinux-policy-contrib-1debe42.tar.gz
+SOURCES/selinux-policy-contrib-fb815bc.tar.gz
+SOURCES/selinux-policy-db25c0e.tar.gz
diff --git a/.selinux-policy.metadata b/.selinux-policy.metadata
index 05667c0..41f73c3 100644
--- a/.selinux-policy.metadata
+++ b/.selinux-policy.metadata
@@ -1,3 +1,3 @@
-b4449b72eb942612b111105c501bf6ded157c1d5 SOURCES/container-selinux.tgz
-a5d2bba6d46a871fa8bd0cb83ffea26f86d8a21e SOURCES/selinux-policy-2049cb7.tar.gz
-0cc01efc49dfc5c792175482071f08cfb94089ee SOURCES/selinux-policy-contrib-1debe42.tar.gz
+ba805a0572301b3cfc64992d859839ee41017104 SOURCES/container-selinux.tgz
+93ba801d00e771257f02e4d79fd50123d8cc78f1 SOURCES/selinux-policy-contrib-fb815bc.tar.gz
+4ddf11da780b6eaa124536869c85baec229640c1 SOURCES/selinux-policy-db25c0e.tar.gz
diff --git a/SPECS/selinux-policy.spec b/SPECS/selinux-policy.spec
index af19d51..6fee4d6 100644
--- a/SPECS/selinux-policy.spec
+++ b/SPECS/selinux-policy.spec
@@ -1,11 +1,11 @@
 # github repo with selinux-policy base sources
 %global git0 https://github.com/fedora-selinux/selinux-policy
-%global commit0 2049cb7a3ba6f00fd0e9630889c4a05ed38c79be
+%global commit0 db25c0eff1c59aff96dd7d14e5d3043dae2aee9e
 %global shortcommit0 %(c=%{commit0}; echo ${c:0:7})
 
 # github repo with selinux-policy contrib sources
 %global git1 https://github.com/fedora-selinux/selinux-policy-contrib
-%global commit1 1debe424a9d4d91c0eb5be1911a682bc8d42b701
+%global commit1 fb815bc5fef94fedb15ed4d6c6ea262a4cd23840
 %global shortcommit1 %(c=%{commit1}; echo ${c:0:7})
 
 %define distro redhat
@@ -29,7 +29,7 @@
 Summary: SELinux policy configuration
 Name: selinux-policy
 Version: 3.14.3
-Release: 51%{?dist}
+Release: 52%{?dist}
 License: GPLv2+
 Source: %{git0}/archive/%{commit0}/%{name}-%{shortcommit0}.tar.gz
 Source29: %{git1}/archive/%{commit1}/%{name}-contrib-%{shortcommit1}.tar.gz
@@ -715,6 +715,24 @@ exit 0
 %endif
 
 %changelog
+* Thu Aug 13 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.3-52
+- Add ipa_helper_noatsecure() interface unconditionally
+Resolves: rhbz#1853432
+- Conditionally allow nagios_plugin_domain dbus chat with init
+Resolves: rhbz#1750821
+- Revert "Update allow rules set for nrpe_t domain"
+Resolves: rhbz#1750821
+- Add ipa_helper_noatsecure() interface to ipa.if
+Resolves: rhbz#1853432
+- Allow tomcat map user temporary files
+Resolves: rhbz#1857675
+- Allow tomcat manage user temporary files
+Resolves: rhbz#1857675
+- Add file context for /sys/kernel/tracing
+Resolves: rhbz#1847331
+- Define named file transition for sshd on /tmp/krb5_0.rcache2
+Resolves: rhbz#1848953
+
 * Mon Aug 03 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.3-51
 - Allow kadmind manage kerberos host rcache
 Resolves: rhbz#1863043