Check For linux version , kernel version and architecture if it is vulnerable and then search exploit in seachsploit
to check version