diff --git a/.gitignore b/.gitignore
index 1b9a9e7..b9c630a 100644
--- a/.gitignore
+++ b/.gitignore
@@ -1,3 +1,3 @@
 SOURCES/container-selinux.tgz
-SOURCES/selinux-policy-b060f75.tar.gz
-SOURCES/selinux-policy-contrib-67d81a2.tar.gz
+SOURCES/selinux-policy-contrib-2d82882.tar.gz
+SOURCES/selinux-policy-ec7e4fd.tar.gz
diff --git a/.selinux-policy.metadata b/.selinux-policy.metadata
index 89259e2..9aede89 100644
--- a/.selinux-policy.metadata
+++ b/.selinux-policy.metadata
@@ -1,3 +1,3 @@
-e2e35900c0f6b83f5f30924b99b1d8c00976bb94 SOURCES/container-selinux.tgz
-172e6c50321dec4815f474d4add417b07c671194 SOURCES/selinux-policy-b060f75.tar.gz
-5bb5e3b7c86e3a41ab62a18bda962094e39dbf02 SOURCES/selinux-policy-contrib-67d81a2.tar.gz
+cbdfd8953bf11fddf74ca36bda2ee718b8a0d753 SOURCES/container-selinux.tgz
+8ac8c4756d731805b29dac09cf522172a96bcbcb SOURCES/selinux-policy-contrib-2d82882.tar.gz
+b26706c162ed902446942e79c199f478d43dc0ae SOURCES/selinux-policy-ec7e4fd.tar.gz
diff --git a/SPECS/selinux-policy.spec b/SPECS/selinux-policy.spec
index dde498c..79d90f6 100644
--- a/SPECS/selinux-policy.spec
+++ b/SPECS/selinux-policy.spec
@@ -1,11 +1,11 @@
 # github repo with selinux-policy base sources
 %global git0 https://github.com/fedora-selinux/selinux-policy
-%global commit0 b060f75003ffda62ccb0f7f35c78899d9e5c5d19
+%global commit0 ec7e4fda601e7952f1b3c60bddd7b176362789a4
 %global shortcommit0 %(c=%{commit0}; echo ${c:0:7})
 
 # github repo with selinux-policy contrib sources
 %global git1 https://github.com/fedora-selinux/selinux-policy-contrib
-%global commit1 67d81a2670f52d13bfbb765f506d20a516612d93
+%global commit1 2d8288242e1cc2086cb322e5414420b87a76d776
 %global shortcommit1 %(c=%{commit1}; echo ${c:0:7})
 
 %define distro redhat
@@ -29,7 +29,7 @@
 Summary: SELinux policy configuration
 Name: selinux-policy
 Version: 3.14.3
-Release: 43%{?dist}
+Release: 44%{?dist}
 License: GPLv2+
 Source: %{git0}/archive/%{commit0}/%{name}-%{shortcommit0}.tar.gz
 Source29: %{git1}/archive/%{commit1}/%{name}-contrib-%{shortcommit1}.tar.gz
@@ -715,6 +715,24 @@ exit 0
 %endif
 
 %changelog
+* Wed May 20 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.3-44
+- Make boinc_var_lib_t label system mountdir attribute
+Resolves: rhbz#1779070
+- Allow aide to be executed by systemd with correct (aide_t) domain
+Resolves: rhbz#1814809
+- Allow chronyc_t domain to use nsswitch
+Resolves: rhbz#1772852
+- Allow nscd_socket_use() for domains in nscd_use() unconditionally
+Resolves: rhbz#1772852
+- Allow gluster geo-replication in rsync mode
+Resolves: rhbz#1831109
+- Update networkmanager_read_pid_files() to allow also list_dir_perms
+Resolves: rhbz#1781818
+- Allow associating all labels with CephFS
+Resolves: bz#1814689
+- Allow tcpdump sniffing offloaded (RDMA) traffic
+Resolves: rhbz#1834773
+
 * Fri Apr 17 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.3-43
 - Update radiusd policy
 Resolves: rhbz#1803407