Qemu 0.9.1 and earlier does not perform range checks for block device read or write requests, which allows guest host users with root privileges to access arbitrary memory and escape the virtual machine.
lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html
secunia.com/advisories/29081
secunia.com/advisories/29129
secunia.com/advisories/29136
secunia.com/advisories/29172
secunia.com/advisories/29963
secunia.com/advisories/34642
secunia.com/advisories/35031
www.debian.org/security/2009/dsa-1799
www.mandriva.com/security/advisories?name=MDVSA-2008:162
www.mandriva.com/security/advisories?name=MDVSA-2009:016
www.redhat.com/archives/fedora-package-announce/2008-February/msg00830.html
www.redhat.com/archives/fedora-package-announce/2008-February/msg00850.html
www.redhat.com/support/errata/RHSA-2008-0194.html
www.securityfocus.com/bid/28001
bugzilla.redhat.com/show_bug.cgi?id=433560
marc.info/?l=debian-security&m=120343592917055&w=2
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9706
www.redhat.com/archives/fedora-package-announce/2008-February/msg00852.html
www.redhat.com/archives/fedora-package-announce/2008-February/msg00857.html
www.redhat.com/archives/fedora-package-announce/2008-February/msg00900.html
www.redhat.com/archives/fedora-package-announce/2008-February/msg00957.html