Wouldn't it be the simplest fix to check in the method verify() if v is smaller than the group order and return false if that is not the case?
Kinda. Signature canonicalization is tricky to rollout. First you need to make sure sign() never outputs a
v larger than the group order; then you need to patch verify to reject sigs where
v is larger than group order. However, if there are fubar
v's already on the blockchain that don't follow the new rules you need logic to grandfather them in. That said, neither of these changes is prudent to do without getting review from a few folks who grok crypto since you're really tinkering with voodoo sex magic at this level ... especially given the obfuscation the optimizations in Curve25519.java add.
The sign() function should also be modified per your earlier recommendation to prevent it from outputting things that won't verify and need be retried ... I kinda have conflicting thoughts ATM about the best way to do this ... still thinking it through.
BTW, your earlier analysis was so close to spotting this security flaw ... I'm kinda surprised you didn't stumble into it.