Distros are backporting security patches into their releases, so no harm done. If you rely on the python.org releases and don't build from source, then yes, that is a bit sad.
Case in point: The Debian security tracker, see their notes section referencing each commit.
The python:3.8 and python:3.9 container images if used to build web services such as Django with GIS extensions may have an RCE until Python.org sources are updated.
Those come from a WHOIS daemon that is reachable in the network as whois.dn42. There's also an authoritative DNS system for the .dn42 TLD with anycasted resolvers
% dig whois.dn42 @resolver.nic.dn42 any +short
172.22.0.43
fd42:d42:d42:43::
as well as some ACME implementation with a CA that is constrained to the .dn42 domain and the allocated IP space.
DN42 is very easy to get into, if you have some networking knowledge. If you're familiar with Linux I'd recommend Bird as a BGP speaker and using Wireguard for L3 tunneling.
> In February 2006, Google made a significant concession to the Great Firewall of China, in exchange for equipment installation on Chinese soil, by blocking websites which the Chinese government deemed illegal.
Case in point: The Debian security tracker, see their notes section referencing each commit.
https://security-tracker.debian.org/tracker/CVE-2021-3177