there is a possible way to bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
https://thehackernews.com/2025/04/google-reports-75-zero-days-exploited.html
https://thehackernews.com/2024/11/google-warns-of-actively-exploited-cve.html
https://securityaffairs.com/170581/uncategorized/cve-2024-43093-android-flaw-actively-exploited.html
https://thehackernews.com/2024/09/google-confirms-cve-2024-32896.html
https://thehackernews.com/2024/08/google-patches-new-android-kernel.html