bpf: Track subprog poke descriptors correctly and fix use-after-free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.53 by commit a9f36bf3613c65cb587c70fac655c775d911409b, it was introduced in version v5.10 by commit a748c6975dea325da540610c2ba9b5f332c603e6. For more details please see the references link.