diff --git a/policy/modules/contrib b/policy/modules/contrib
index bbaade66e..f371df35b 160000
--- a/policy/modules/contrib
+++ b/policy/modules/contrib
@@ -1 +1 @@
-Subproject commit bbaade66e2b6ebad9fad744008a5390eac7a74d8
+Subproject commit f371df35b44f6ed874ce3ff8a57cb19df7ff0663
diff --git a/policy/modules/system/fstools.te b/policy/modules/system/fstools.te
index 2b14f0834..bd36955cc 100644
--- a/policy/modules/system/fstools.te
+++ b/policy/modules/system/fstools.te
@@ -1,4 +1,4 @@
-policy_module(fstools, 1.20.5)
+policy_module(fstools, 1.20.6)
########################################
#
@@ -152,6 +152,8 @@ logging_send_syslog_msg(fsadm_t)
miscfiles_read_localization(fsadm_t)
+# for /run/mount/utab
+mount_getattr_runtime_files(fsadm_t)
# losetup: bind mount_loopback_t files to loop devices
mount_rw_loopback_files(fsadm_t)
diff --git a/policy/modules/system/mount.if b/policy/modules/system/mount.if
index 370628006..25b0514c1 100644
--- a/policy/modules/system/mount.if
+++ b/policy/modules/system/mount.if
@@ -210,6 +210,24 @@ interface(`mount_rw_loopback_files',`
allow $1 mount_loopback_t:file rw_file_perms;
')
+########################################
+##
+## Getattr on mount_var_run_t files
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+interface(`mount_getattr_runtime_files',`
+ gen_require(`
+ type mount_runtime_t;
+ ')
+
+ allow $1 mount_runtime_t:file getattr;
+')
+
########################################
##
## Read and write mount runtime files.
diff --git a/policy/modules/system/mount.te b/policy/modules/system/mount.te
index f58a62bc4..1f16a6693 100644
--- a/policy/modules/system/mount.te
+++ b/policy/modules/system/mount.te
@@ -1,4 +1,4 @@
-policy_module(mount, 1.19.4)
+policy_module(mount, 1.19.5)
########################################
#
diff --git a/policy/modules/system/selinuxutil.te b/policy/modules/system/selinuxutil.te
index 97318a65c..7224e867a 100644
--- a/policy/modules/system/selinuxutil.te
+++ b/policy/modules/system/selinuxutil.te
@@ -1,4 +1,4 @@
-policy_module(selinuxutil, 1.22.7)
+policy_module(selinuxutil, 1.22.8)
gen_require(`
bool secure_mode;
@@ -665,6 +665,10 @@ ifdef(`hide_broken_symptoms',`
')
')
+optional_policy(`
+ apt_use_fds(setfiles_t)
+')
+
optional_policy(`
hotplug_use_fds(setfiles_t)
')