Aws-encryption-sdk

Latest version: v4.0.1

Safety actively analyzes 724166 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 2 of 5

3.0.0

===================

Deprecation
-----------
The AWS Encryption SDK for Python no longer supports Python 2 or Python 3.4
as of major version 3.x; only Python 3.5+ is supported. Customers using Python 2
or Python 3.4 can still use the 2.x line of the AWS Encryption SDK for Python,
which will continue to receive security updates for the next 12 months, in accordance
with our `Support Policy <https://github.com/aws/aws-encryption-sdk-python/blob/master/SUPPORT_POLICY.rst>`__.

Maintenance
-----------
* Move away from deprecated cryptography ``int_from_bytes``
`355 <https://github.com/aws/aws-encryption-sdk-python/pull/355>`_

2.4.0

===================

Deprecation Announcement
------------------------
The AWS Encryption SDK for Python is discontinuing support for Python 2. Future major versions of this library
will drop support for Python 2 and begin to adopt changes that are known to break Python 2.

Support for Python 3.4 will be removed at the same time. Moving forward, we will support Python 3.5+.

Security updates will still be available for the Encryption SDK 2.x line for the next 12 months, in accordance with our `Support Policy <https://github.com/aws/aws-encryption-sdk-python/blob/master/SUPPORT_POLICY.rst>`__.

2.3.0

===================

Features
--------
* AWS KMS multi-Region Key support

Added new the master key MRKAwareKMSMasterKey
and the new master key providers MRKAwareStrictAwsKmsMasterKeyProvider
and MRKAwareDiscoveryAwsKmsMasterKeyProvider
that support AWS KMS multi-Region Keys.

See https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html
for more details about AWS KMS multi-Region Keys.
See https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/configure.html#config-mrks
for more details about how the AWS Encryption SDK interoperates
with AWS KMS multi-Region keys.

2.2.0

===================

Features
--------
* Improvements to the message decryption process

See https://github.com/aws/aws-encryption-sdk-python/security/advisories/GHSA-x5h4-9gqw-942j.

2.1.0

Not secure
===================

Maintenance
-----------
* New minimum cryptography dependency 2.5.0 since we're using newer byte type checking
`308 <https://github.com/aws/aws-encryption-sdk-python/pull/308>`_
* New minimum boto dependency 1.10.0 to ensure KMS Decrypt APIs know about the KeyId parameter
`317 <https://github.com/aws/aws-encryption-sdk-python/pull/317>`_
* Add python 3.8 and 3.9 to CI and update setup.py to clarify we support them
`329 <https://github.com/aws/aws-encryption-sdk-python/pull/329>`_
* Update decrypt oracle and test vector handlers with 2.0.0 changes
`303 <https://github.com/aws/aws-encryption-sdk-python/pull/303>`_
* Added a number of CodeBuild specs to support integration tests and release processes

2.0.0

Not secure
===================

Features
--------
* Updates to the AWS Encryption SDK. 73cce71

Breaking Changes
^^^^^^^^^^^^^^^^
* ``KMSMasterKeyProvider`` is removed. Customers must use ``StrictAwsKmsMasterKeyProvider``
with explicit key ids, or ``DiscoveryAwsKmsMasterKeyProvider`` to allow decryption of any
ciphertext to which the application has access.
* The ``encrypt``, ``decrypt``, and ``stream`` methods in the ``aws_encryption_sdk`` module
are removed, replaced by identically named methods on the new ``EncryptionSDKClient`` class.
* Key committing algorithm suites are now default.

See `Migration guide <https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/migration.html>`_
for more details.

Page 2 of 5

© 2025 Safety CLI Cybersecurity Inc. All Rights Reserved.