A new vulnerability (CVE-2023-51767) in openssh has been published, but there seems to be no fix yet. NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-51767
This attack was not demonstrated against stock OpenSSH, but instead against a modified sshd that had extra synchronisation added to make the attack easier. AFAIK achieving the timing required to successfully exploit is close to impossible in the real world. See section 9 of their paper https://arxiv.org/pdf/2309.02545.pdf They don't mention it, but any kind of ASLR would increase the difficulty of attack by several orders of magnitude. Nobody has demonstrated this attack against a configuration remotely approximating real-world conditions. We consider rowhammer mitigation to the job of the platform, not userspace software.
This bug was set to resolved / fixed. Was there a fix committed to the git repository? I couldn't find one in https://anongit.mindrot.org/openssh.git/log
No, see comment 1 here