qemu-kvm is vulnerable to arbitrary code execution. The vulnerability exists as it was found that the virtio-blk driver in qemu-kvm did not properly validate read and write requests from guests. A privileged guest user could use this flaw to crash the guest or, possibly, execute arbitrary code on the host.
docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html-single/6.1_Technical_Notes/index.html
git.kernel.org/?p=virt/kvm/qemu-kvm.git%3Ba=commitdiff%3Bh=52c050236eaa4f0b5e1d160cd66dc18106445c4d
git.kernel.org/?p=virt/kvm/qemu-kvm.git;a=commitdiff;h=52c050236eaa4f0b5e1d160cd66dc18106445c4d
lists.fedoraproject.org/pipermail/package-announce/2012-June/081972.html
lists.gnu.org/archive/html/qemu-devel/2011-03/msg03015.html
lists.gnu.org/archive/html/qemu-devel/2011-03/msg03019.html
lists.opensuse.org/opensuse-updates/2011-05/msg00043.html
rhn.redhat.com/errata/RHSA-2011-0534.html
secunia.com/advisories/44132
secunia.com/advisories/44393
secunia.com/advisories/44658
secunia.com/advisories/44660
secunia.com/advisories/44900
www.osvdb.org/73756
access.redhat.com/errata/RHSA-2011:0534
access.redhat.com/security/cve/CVE-2011-1750
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=698906
exchange.xforce.ibmcloud.com/vulnerabilities/67062
hermes.opensuse.org/messages/8572547
www.debian.org/security/2011/dsa-2230
www.ubuntu.com/usn/USN-1145-1/