It's not really a new attack (though the press is hyping it as such.)
It's a quicker way of getting the authentication handshake, rather than capturing the 4 way handshake you just need to capture a single EAPOL packet.
However it was never that hard to capture that handshake anyway, so if the attacker even half way knew what they were doing.
As it is exploiting the actual protocol to make the capture of the data any product using the protocols is exposed.
It still takes the same length of time to break the password, so the usual long password with non dictionary passwords still applies (still about 8 days for a (sensibly chosen) 10 character password.
You of course could turn of the roaming I suppose