Red Hat Bugzilla – Bug 1017430
CVE-2013-4412 slim: malformed or unsupported salts can crash login daemon
Last modified: 2015-07-31 03:11:00 EDT
It was reported  that slim 1.3.6 corrected  a potential security related to a potential NULL pointer dereference when using crypt() from glibc 2.17+. If using this version of glibc with older versions of slim, the login daemon could crash when processing malformed or unsupported salts.
Although Fedora 18 ships this version of slim, it does not use a version of glibc that exposes this issue (Fedora 18 ships with glibc 2.16).