Let me get this straight: an attacker has gained access to a VM, escalated
privilege, escaped the (probably-hardware assisted) VM containment and they
think that more OS-level controls will prevent the same thing happening in
the host OS? IMO it is more likely that they escaped the VM by exploiting
bugs in the host OS kernel to begin with so sVirt couldn't help anyway...