According to the article, the private key information is leaked through memory caches, so it looks like libgcrypt's solution just ensures that the data written to memory caches is random, rather than leaking the private key.
Also according to the article, libsecp256k1 isn't vulnerable, and they still only do 2 point multiplications [2] (compared to libgcrypt's 5 point multiplications). So it is possible to mitigate this attack efficiently.
[1] https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/0004...
[2] https://github.com/bitcoin-core/secp256k1/blob/master/src/ec...
https://github.com/bitcoin-core/secp256k1/search?utf8=%E2%9C...
The constant-time crypto in BearSSL seems like the best approach — I’m just curious if the above approaches could be used as a quick fix for the affected codebases until they can be fixed properly.