Every software component has two things you can change: its implementation (fixable) and its design (mostly not, not without rewriting). When a CVE matches the implementation level, patches work. You closed the specific path. The class of bug requires a new implementation bug to reappear, and those are, over time, fewer.
When the CVE matches the design level, patches are a treadmill. The vulnerable behavior is what the component DOES. Taking it away would mean the component stops doing its job. The patch therefore closes one triggering condition, narrows one reachable path, tightens one interface. The primitive, the underlying capability the design grants attackers once they reach it, remains.
Three clues that you are looking at an unpatchable primitive rather than ordinary design debt. First, each patch's advisory explains the specific path closed, but the root cause discussion describes an architectural property, not a coding mistake. Second, the patch cadence does not trend downward. Third, the researchers credited across years are different people with different specialties, all finding the same general shape, because the shape is a property of the design and the design is stable.
Unpatchable primitives do not respond to normal vulnerability management. Tracking patch levels is accurate reporting and insufficient defense. The next instance is not prevented by being current on the last instance. Only architecture changes (replacement, isolation, capability restriction) reduce exposure.