It isn't nearly as broken as people who don't know what they're talking about claim.
* WPA has always had the known TKIP flaw. WPA was made to bridge WEP and WPA2.
* This attack never reveals the actual WPA key.
* This attack works only one way, AP to client, and only with small packets (e.g. ARP packets). Furthermore, it can only be used for between 8-15 packets. After that, the attacker would need decode it all over again for the next 8-15 packets.
All-in-all, it's only mildly interesting, especially if you are using WPA2 and a VPN on top of that for any critical data.
This has been discussed in detail going back 14 months ago. You really need to search.
Finally, WPA2 uses a different cryptological algorithm, and was designed to be stronger. As I stated above, WPA was made to bridge WEP and WPA2. As an algorithm, it has had known flaws which were considered acceptable for the reason that it was considered a stopgap. Simply put, WPA2 was designed NOT to have those flaws.