关键信息 Title nicbarker clay v0.14 and master-branch Memory Corruption Description Segmentation Fault (SEGV) due to READ memory access at address 0x0 (Null Pointer Dereference) within function. Crash is reproducible in RELEASE builds (-O3) indicating a runtime critical bug. Environment OS: Linux x86_64 Compiler: Clang with Tools: AddressSanitizer Affected Version: 'master branch' Vulnerability Details Target: Clay (clay.h) Crash Type: Segmentation Fault (SEGV) on READ access Location: clay.h:1666 (inside ) Crash Address: 0x00000000000000 Root Cause Analysis: ASan report shows crash happens at line 1666 of clay.h due to READ memory access at address 0x0, suggesting attempts to access a NULL structure pointer member. Reproduce Build Configuration: RELEASE build with AddressSanitizer enabled.