The virtio_queue_notify in qemu-kvm 0.14.0 and earlier does not properly validate the virtqueue number, which allows guest users to cause a denial of service (guest crash) and possibly execute arbitrary code via a negative number in the Queue Notify field of the Virtio Header, which bypasses a signed comparison.
https://www.debian.org/security/2011/dsa-2270
https://hermes.opensuse.org/messages/9605323
http://www.openwall.com/lists/oss-security/2011/06/29/15
http://www.openwall.com/lists/oss-security/2011/06/28/13
http://ubuntu.com/usn/usn-1165-1
http://secunia.com/advisories/45301
http://secunia.com/advisories/45170
http://secunia.com/advisories/45158
http://secunia.com/advisories/44648
http://secunia.com/advisories/44458
http://rhn.redhat.com/errata/RHSA-2011-0919.html
http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00007.html