First and most importantly, ZDNet's George Ou offers a pretty thorough set of instructions on how to check if you're vulnerable or not, and how to update your drivers.
At Wi-Fi Planet, Eric Griffith points out that this ain't exactly new news. "The problem was revealed this past weekend to the general public by the Month of Kernel Bugs (MoKB) project," he writes. "However, it was found earlier this year by Jon Ellch, the researcher who goes by the handle Johnny Cache. He demonstrated the problem at Microsoft's Blue Hat hacker summit last month."
Wi-Fi Networking News' Glenn Fleishman notes there's not much you can do to defend yourself, at least in the short term. "While this is a serious exploit, it has to be carried out by individuals, even individuals with high-gain antennas," he writes. "Because the vector doesn't work over the Internet or over local networks, only within the range of active Wi-Fi adapters accepting probe responses within reach of a malicious user, this reduces the scope of the number of possible machines infected. A crazy black-hat wardriver might be able to drive around a city and own machine after machine, true. What can you do in the meantime with an affected driver? Unfortunately, the only option for true security is finding an Ethernet cable and disabling your radio."