The largest Let's Encrypt CRL right now is 254 KB. Most are smaller. We might want to partition into smaller shards again to hit a bit smaller size than that in the future.
Shorter certificate lifetimes will also reduce CRL sizes.
A lot of traffic comes from browsers, or TLS stacks integrated with their host operating system, which we expect will use compressed push-based methods like Mozilla's CRLite to receive more efficient data structures as well.
One thing this announcement allows us to do is motivate us to start working on making CRL mechanisms more efficient.
I think one would expect a partition to cover a lot of certificates for its size (or in the case of a compromise all certificates mapped to that partition) so I don't think you end up with nearly so meaningful a problem.
Everything I described can be done programmatically. I've written the code to do it.
But anyways, as mcpherrinm reminded me, certificates will still have the CRL Distribution Point extension so you can forget what I said about the CCADB and just do what the RFCs say.
It's true this isn't an IETF standard (sometimes the IETF standards just don't work in practice) but the data is still very much in the open.