“The answer lies in an important observation: vulnerabilities decay exponentially. They have a half-life. The distribution of vulnerability lifetime follows an exponential distribution…”
https://security.googleblog.com/2024/09/eliminating-memory-safety-vulnerabilities-Android.html