Trying to learn....
The ultimate difference between the vulnerability outlined in the answer posted here and KRACK attack is that with KRACK attack, the attacker does not need the AP pass phrase?
The primary difference between the two is that the KRACK attack targets the end-user and not the network itself. The attacker essentially creates a clone of a network that has already been associated and trusted with the target user's device. The attacker then "forces" the victim to connect to their rogue access point at which point they are in a Man-in-the-Middle position. They are now in a position to eavesdrop on traffic and potentially implement an SSLStrip attack to eavesdrop on TLS connections.
The linked question refers to an attacker joining a wireless network for nefarious purposes. At no time during the KRACK attack does an adversary join a network, nor do they compromise the network password. They impersonate that network.
EDIT : It should be stated that the KRACK attack is a form of sniffing, though the method you use to be in a position to sniff is different from the WPA2 sniffing question you linked to.
The main attack is against the 4-way handshake of the WPA2 protocol. This handshake is executed when a client wants to join a protected Wi-Fi network, and is used to confirm that both the client and access point possess the correct credentials (example, the pre-shared password of the network). At the same time, the 4-way handshake also negotiates a fresh encryption key that will be used to encrypt all subsequent traffic. Currently, all modern protected Wi-Fi networks use the 4-way handshake. This implies all these networks are affected by (some variant of) our attack. For instance, the attack works against personal and enterprise Wi-Fi networks, against the older WPA and the latest WPA2 standard, and even against networks that only use AES.