The Fedora kernel configs have CONFIG_LEGACY_VSYSCALL_EMULATE=y, which enables vsyscall emulation. This is superseded by CONFIG_LEGACY_VSYSCALL_XONLY, which should work just as well. XONLY mode prevents the use of the vsyscall page as an ASLR-bypassing readable page with known contents (yes, an attack like this has actually been demonstrated). It also blocks access to the nasty kernel mechanism that allows ptrace() to read the vsyscall page, which means it would prevent exploitation of the recent, no-CVE-yet page refcount underflow in that code path. The only down side I'm aware of is that using outdated versions of Pin (an open-source Intel tool) in conjunction with outdated glibc versions will not work in XONLY mode. New versions of Pin will work even with old binaries in XONLY mode, and old versions of Pin will work with new binaries in XONLY mode. This seems like an appropriate tradeoff for Fedora, and it's the upstream kernel default.