Guess everyone already has that information... but for the sake of completeness:
http://www.linuxquestions.org/questions/showthread.php?s=ca2d6e3dcc8a44a26f3e835b47eda5ec&p=5244204#post5244204
Shows how to manually patch the vuln on different distributions. There are also some additional links like the metasploit modul and such.
And maybe this is useful for some of you too:
http://cultofthedyingsun.wordpress.com/
Should give you an idea about a iptables rule and a snort rule to protect your machines.
Cheers,
RBA