A tight loop in user level process isn't preempted unless a realtime process is woken up on the cpu. Some important kernel threads such as events/*, kblockd/* can be blocked by the process, and the machine stalls. Unprivileged local user could use this flaw to DoS the system. Upstream commit: f26f9aff6aaf67e9a430d16c266f91b13a5bff64 Reference: https://lkml.org/lkml/2010/11/20/212
There are no longer any 2.x kernels available in the repository with the exception of sys-kernel/xbox-sources which is unsupported by security.