Exploitation involves sending a malicious UDP packet to port 631 on the target, directing it to an attacker-controlled IPP server.
Okay, so at least until this is patched, it would be a good idea to shut down any CUPS-related process that's listening on port 631, and avoid interaction with untrusted or potentially compromised print servers.
Either of these commands will list such processes:
$ sudo lsof -i :631
$ sudo fuser -v 631/tcp 631/udp
I don't want to diminish the urgency of this vulnerability, but it is worth noting that "affecting all GNU/Linux systems" does not mean that every affected system is actually running the vulnerable code. Some installations don't run print services and don't ever communicate with printers.
Also, I suspect that the author's use of "GNU" in that warning is misleading, potentially giving a false sense of security. (Sadly, a certain unfortunate meme has led many people to think that all Linux systems are GNU systems, and the author appears to be among them.) I don't see any reason to think musl builds of CUPS are immune, for example, so I don't assume my Alpine systems are safe just because they are not GNU/Linux.