Me too, since all glibc >= 2.9 versions till today are affected, with
the glibc on Knoppix being no exception.
For exploiting the vulnerability, the attacker must own the directly
queried DNS server (i.e. the users access point, or the ISPs DNS server)
and send manipulated DNS replies from there, or be able to hijack TCP
connections, and in most cases, programs will just crash on the
getaddrinfo() library call, but code injection on the stack may be
possible. Though an attack isn't really easy, it's a real possibility.
The easy commandline method (for USB flash disk users) for fixing the
problem, thanks to debian's quick reaction in the unstable branch, would be:
sudo apt-get update ; sudo apt-get install -t unstable libc6
which also updates libc6 dependencies.