The virtio_queue_notify in qemu-kvm 0.14.0 and earlier does not properly validate the virtqueue number, which allows guest users to cause a denial of service (guest crash) and possibly execute arbitrary code via a negative number in the Queue Notify field of the Virtio Header, which bypasses a signed comparison.
git.kernel.org/?p=virt/kvm/qemu-kvm.git%3Ba=commitdiff%3Bh=7157e2e23e89adcd436caeab31fdd6b47eded377
lists.opensuse.org/opensuse-security-announce/2011-07/msg00007.html
rhn.redhat.com/errata/RHSA-2011-0919.html
secunia.com/advisories/44458
secunia.com/advisories/44648
secunia.com/advisories/45158
secunia.com/advisories/45170
secunia.com/advisories/45301
ubuntu.com/usn/usn-1165-1
www.openwall.com/lists/oss-security/2011/06/28/13
www.openwall.com/lists/oss-security/2011/06/29/15
www.osvdb.org/74751
hermes.opensuse.org/messages/9605323
www.debian.org/security/2011/dsa-2270