qemu-kvm is vulnerable to privilege escalation. The vulnerability exists as it was found that the virtio subsystem in qemu-kvm did not properly validate virtqueue in and out requests from the guest. A privileged guest user could use this flaw to trigger a buffer overflow, allowing them to crash the guest (denial of service) or, possibly, escalate their privileges on the host.
lists.opensuse.org/opensuse-security-announce/2011-07/msg00007.html
rhn.redhat.com/errata/RHSA-2011-0919.html
secunia.com/advisories/45158
secunia.com/advisories/45170
secunia.com/advisories/45187
secunia.com/advisories/45188
secunia.com/advisories/45301
secunia.com/advisories/45354
ubuntu.com/usn/usn-1165-1
www.osvdb.org/74751
access.redhat.com/errata/RHSA-2011:0919
access.redhat.com/security/cve/CVE-2011-2212
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=713589
hermes.opensuse.org/messages/9605323
www.debian.org/security/2011/dsa-2282