diff --git a/policy/modules/services/procmail.te b/policy/modules/services/procmail.te
index bf1e99c..15bc32c 100644
--- a/policy/modules/services/procmail.te
+++ b/policy/modules/services/procmail.te
@@ -1,5 +1,5 @@
-policy_module(procmail,1.2.5)
+policy_module(procmail,1.2.6)
########################################
#
@@ -38,6 +38,7 @@ corenet_udp_sendrecv_all_ports(procmail_t)
corenet_udp_bind_all_nodes(procmail_t)
corenet_tcp_connect_spamd_port(procmail_t)
corenet_sendrecv_spamd_client_packets(procmail_t)
+corenet_sendrecv_comsat_client_packets(procmail_t)
dev_read_urand(procmail_t)
diff --git a/policy/modules/services/rpc.if b/policy/modules/services/rpc.if
index 52dd231..32b5371 100644
--- a/policy/modules/services/rpc.if
+++ b/policy/modules/services/rpc.if
@@ -1,5 +1,21 @@
## Remote Procedure Call Daemon for managment of network based process communication
+########################################
+##
+## RPC stub interface. No access allowed.
+##
+##
+##
+## N/A
+##
+##
+#
+interface(`rpc_stub',`
+ gen_require(`
+ type exports_t;
+ ')
+')
+
#######################################
##
## The template to define a rpc domain.
@@ -95,6 +111,7 @@ template(`rpc_domain_template', `
miscfiles_read_localization($1_t)
+ sysnet_dns_name_resolve($1_t)
sysnet_read_config($1_t)
userdom_dontaudit_use_unpriv_user_fds($1_t)
diff --git a/policy/modules/services/rpc.te b/policy/modules/services/rpc.te
index 318ec0a..955933c 100644
--- a/policy/modules/services/rpc.te
+++ b/policy/modules/services/rpc.te
@@ -1,5 +1,5 @@
-policy_module(rpc,1.2.13)
+policy_module(rpc,1.2.14)
########################################
#
diff --git a/policy/modules/system/mount.te b/policy/modules/system/mount.te
index 3920f15..5d5bd5a 100644
--- a/policy/modules/system/mount.te
+++ b/policy/modules/system/mount.te
@@ -1,5 +1,5 @@
-policy_module(mount,1.3.10)
+policy_module(mount,1.3.11)
########################################
#
@@ -148,6 +148,10 @@ optional_policy(`
fs_search_rpc(mount_t)
+ sysnet_dns_name_resolve(mount_t)
+
+ rpc_stub(mount_t)
+
optional_policy(`
nis_use_ypbind(mount_t)
')
diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if
index 407b2c3..1bc0ac8 100644
--- a/policy/modules/system/userdomain.if
+++ b/policy/modules/system/userdomain.if
@@ -952,6 +952,7 @@ template(`userdom_unpriv_user_template', `
# the same domain and outside users) disabling this forces FTP passive mode
# and may change other protocols
tunable_policy(`user_tcp_server',`
+ corenet_tcp_bind_all_nodes($1_t)
corenet_tcp_bind_generic_port($1_t)
')
diff --git a/policy/modules/system/userdomain.te b/policy/modules/system/userdomain.te
index ba8819b..f292eca 100644
--- a/policy/modules/system/userdomain.te
+++ b/policy/modules/system/userdomain.te
@@ -1,5 +1,5 @@
-policy_module(userdomain,1.3.31)
+policy_module(userdomain,1.3.32)
gen_require(`
role sysadm_r, staff_r, user_r;