virglrenderer is vulnerable to arbitrary code execution. A heap-based buffer overflow in the vrend_renderer_transfer_write_iov
function in vrend_renderer.c
allows guest OS users to cause a denial of service condition and execute arbitrary code via VIRGL_CCMD_RESOURCE_INLINE_WRITE commands.
lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html
access.redhat.com/security/cve/cve-2019-18389
bugzilla.redhat.com/show_bug.cgi?id=1765577
gitlab.freedesktop.org/virgl/virglrenderer/commit/cbc8d8b75be360236cada63784046688aeb6d921
gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=9c280a28651507e6ef87b17b90d47b6af3a4ab7d
lists.debian.org/debian-lts-announce/2022/12/msg00017.html