This flaw is triggered by a fatal error generated in SplMinHeap::compare. To achieve that reporters created a PHP script which overrides compare method with a custom one that throws such error. Triggering this without a malicious script is unlikely. Upstream did not consider this to be a security issue - type of both upstream bug was changed form Security to Bug. Reporters also assume local attack vector, which implies malicious script author. PHP has never been safe against malicious scripts, and removal of the safe mode feature in PHP 5.4 acknowledges that:
http://php.net/manual/en/features.safe-mode.php
There is no plan to address this in Red Hat products.