You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@camel.apache.org by bu...@apache.org on 2018/09/07 07:31:27 UTC

svn commit: r1034810 [2/3] - in /websites/production/camel/content: ./ 2015/10/14/ 2018/09/ 2018/09/07/ cache/

Modified: websites/production/camel/content/news.html
==============================================================================
--- websites/production/camel/content/news.html (original)
+++ websites/production/camel/content/news.html Fri Sep  7 07:31:26 2018
@@ -95,6 +95,30 @@
                  </span>
             </span>
             <span class="blogHeading">
+                <a shape="rect" class="blogHeading" href="2018/09/07/apache-camel-2221-released.html">Apache Camel 2.22.1 Released</a>
+                </span><div class="page-metadata not-personal">    <a shape="rect" class="url fn confluence-userlink" href="    /confluence/display/~gzurowski ">Gregor Zurowski</a> posted on Sep 07, 2018</div>
+            
+        </div>
+    
+    <div class="wiki-content">
+        <p>The Camel community announces the immediate availability of the new patch release Camel 2.22.1. This release contains 47 fixes applied in the past few weeks by the community on the Camel 2.22.x maintenance branch.</p><p>The artifacts are published and ready for you to&#160;<a shape="rect" class="external-link" href="http://camel.apache.org/download.html">download</a>&#160;either from the Apache mirrors or from the Central Maven repository. For more details please take a look at the&#160;<a shape="rect" class="external-link" href="https://issues.apache.org/jira/secure/ReleaseNote.jspa?version=12343346&amp;projectId=12311211">release notes</a>.<br clear="none">Many thanks to all who made this release possible.</p><p>On behalf of the Camel PMC,<br clear="none">Gregor Zurowski</p>
+    </div>
+    
+        
+    </div>
+    
+        
+<div class="blog-post-listing">
+            <div class="logo-heading-block">
+            <span class="logoBlock">
+                 <span class="aui-avatar aui-avatar-large">
+                     <span class="aui-avatar-inner">
+                         <a shape="rect" class="userLogoLink" href="    /confluence/display/~gzurowski ">
+              <img class="userLogo logo" src="news.userimage/gzurowski-89607-pp-wojtek-avatar.png" alt="User icon: gzurowski" title="gzurowski">
+           </a>                     </span>
+                 </span>
+            </span>
+            <span class="blogHeading">
                 <a shape="rect" class="blogHeading" href="2018/07/26/apache-camel-2204-released.html">Apache Camel 2.20.4 Released</a>
                 </span><div class="page-metadata not-personal">    <a shape="rect" class="url fn confluence-userlink" href="    /confluence/display/~gzurowski ">Gregor Zurowski</a> posted on Jul 26, 2018</div>
             
@@ -537,30 +561,6 @@
     </div>
     
         
-    </div>
-    
-        
-<div class="blog-post-listing">
-            <div class="logo-heading-block">
-            <span class="logoBlock">
-                 <span class="aui-avatar aui-avatar-large">
-                     <span class="aui-avatar-inner">
-                         <a shape="rect" class="userLogoLink" href="    /confluence/display/~gzurowski ">
-              <img class="userLogo logo" src="news.userimage/gzurowski-89607-pp-wojtek-avatar.png" alt="User icon: gzurowski" title="gzurowski">
-           </a>                     </span>
-                 </span>
-            </span>
-            <span class="blogHeading">
-                <a shape="rect" class="blogHeading" href="2017/06/15/apache-camel-2191-released.html">Apache Camel 2.19.1 Released</a>
-                </span><div class="page-metadata not-personal">    <a shape="rect" class="url fn confluence-userlink" href="    /confluence/display/~gzurowski ">Gregor Zurowski</a> posted on Jun 15, 2017</div>
-            
-        </div>
-    
-    <div class="wiki-content">
-        <p>The Camel community announces the immediate availability of the new patch release Camel 2.19.1. This release contains 57 fixes applied in the past few weeks by the community on the Camel 2.19.x maintenance branch.</p><p>The artifacts are published and ready for you to <a shape="rect" class="external-link" href="http://camel.apache.org/download.html">download</a> either from the Apache mirrors or from the Central Maven repository. For more details please take a look at the <a shape="rect" class="external-link" href="https://issues.apache.org/jira/secure/ReleaseNote.jspa?version=12340460&amp;projectId=12311211">release notes</a>.</p><p>Many thanks to all who made this release possible.</p><p>On behalf of the Camel PMC,<br clear="none">Gregor Zurowski</p>
-    </div>
-    
-        
     </div>
     </div></div>
         </td>

Modified: websites/production/camel/content/processorfactory.html
==============================================================================
--- websites/production/camel/content/processorfactory.html (original)
+++ websites/production/camel/content/processorfactory.html Fri Sep  7 07:31:26 2018
@@ -129,6 +129,7 @@ public static class MyFactory implements
 <p>The unit test and route is as follows:</p>
 
 Error rendering macro 'code': Invalid value specified for parameter 'java.lang.NullPointerException'<pre class="conf-macro output-inline" data-hasbody="true" data-macro-name="unmigrated-inline-wiki-markup">
+@Test
 public void testAlterDefinitionUsingProcessorFactory() throws Exception {
     getMockEndpoint("mock:foo").expectedBodiesReceived("body was altered");
 
@@ -137,6 +138,7 @@ public void testAlterDefinitionUsingProc
     assertMockEndpointsSatisfied();
 }
 
+@Test
 public void testAlterDefinitionUsingProcessorFactoryWithChild() throws Exception {
     getMockEndpoint("mock:split").expectedBodiesReceived("body was altered", "body was altered");
     getMockEndpoint("mock:extra").expectedBodiesReceived("body was altered", "body was altered");

Modified: websites/production/camel/content/security-advisories.html
==============================================================================
--- websites/production/camel/content/security-advisories.html (original)
+++ websites/production/camel/content/security-advisories.html Fri Sep  7 07:31:26 2018
@@ -78,7 +78,7 @@
 	<tbody>
         <tr>
         <td valign="top" width="100%">
-<div class="wiki-content maincontent"><h3 id="SecurityAdvisories-2018">2018</h3><ul><li><a shape="rect" href="security-advisories.data/CVE-2018-8027.txt.asc?version=4&amp;modificationDate=1533020841313&amp;api=v2" data-linked-resource-id="89065844" data-linked-resource-version="4" data-linked-resource-type="attachment" data-linked-resource-default-alias="CVE-2018-8027.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain" data-linked-resource-container-id="34833933" data-linked-resource-container-version="18">CVE-2018-8027</a><a shape="rect" href="security-advisories.data/CVE-2018-8027.txt.asc?version=4&amp;modificationDate=1533020841313&amp;api=v2" data-linked-resource-id="89065844" data-linked-resource-version="4" data-linked-resource-type="attachment" data-linked-resource-default-alias="CVE-2018-8027.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain" data-linked-resource-container-id="34833933" data-linked-resource-conta
 iner-version="18">&#160;</a>-&#160;Apache Camel's Core is vulnerable to XXE in XSD validation processor</li></ul><h3 id="SecurityAdvisories-2017">2017</h3><ul><li><a shape="rect" href="security-advisories.data/CVE-2017-12634.txt.asc?version=1&amp;modificationDate=1510733922000&amp;api=v2" data-linked-resource-id="74687198" data-linked-resource-version="1" data-linked-resource-type="attachment" data-linked-resource-default-alias="CVE-2017-12634.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain" data-linked-resource-container-id="34833933" data-linked-resource-container-version="18">CVE-2017-12634</a>&#160;- Apache Camel's Castor unmarshalling operation is vulnerable to Remote Code Execution attacks</li><li><a shape="rect" href="security-advisories.data/CVE-2017-12633.txt.asc?version=1&amp;modificationDate=1510733921000&amp;api=v2" data-linked-resource-id="74687197" data-linked-resource-version="1" data-linked-resource-type="attachment" data-linked-reso
 urce-default-alias="CVE-2017-12633.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain" data-linked-resource-container-id="34833933" data-linked-resource-container-version="18">CVE-2017-12633</a>&#160;- Apache Camel's Hessian unmarshalling operation is vulnerable to Remote Code Execution attacks</li><li><a shape="rect" href="security-advisories.data/CVE-2017-5643.txt.asc?version=1&amp;modificationDate=1489652454000&amp;api=v2" data-linked-resource-id="68719271" data-linked-resource-version="1" data-linked-resource-type="attachment" data-linked-resource-default-alias="CVE-2017-5643.txt.asc" data-linked-resource-content-type="application/pgp-encrypted" data-linked-resource-container-id="34833933" data-linked-resource-container-version="18">CVE-2017-5643</a>&#160;-&#160;Apache Camel's Validation Component is vulnerable against SSRF via remote DTDs and XXE</li><li><a shape="rect" href="security-advisories.data/CVE-2017-3159.txt.asc?version=1&amp;modificatio
 nDate=1486565167000&amp;api=v2" data-linked-resource-id="67641933" data-linked-resource-version="1" data-linked-resource-type="attachment" data-linked-resource-default-alias="CVE-2017-3159.txt.asc" data-linked-resource-content-type="application/pgp-encrypted" data-linked-resource-container-id="34833933" data-linked-resource-container-version="18">CVE-2017-3159</a>&#160;-&#160;Apache Camel's Snakeyaml unmarshalling operation is vulnerable to Remote Code Execution attacks</li></ul><h3 id="SecurityAdvisories-2016">2016</h3><ul><li><a shape="rect" href="security-advisories.data/CVE-2016-8749.txt.asc?version=2&amp;modificationDate=1486565034000&amp;api=v2" data-linked-resource-id="67641927" data-linked-resource-version="2" data-linked-resource-type="attachment" data-linked-resource-default-alias="CVE-2016-8749.txt.asc" data-linked-resource-content-type="application/pgp-encrypted" data-linked-resource-container-id="34833933" data-linked-resource-container-version="18">CVE-2016-8749</a>&#1
 60;-&#160;Apache Camel's Jackson and JacksonXML unmarshalling operation are vulnerable to Remote Code Execution attacks</li></ul><h3 id="SecurityAdvisories-2015">2015</h3><ul><li><a shape="rect" href="security-advisories.data/CVE-2015-5344.txt.asc?version=1&amp;modificationDate=1454056803000&amp;api=v2" data-linked-resource-id="61338184" data-linked-resource-version="1" data-linked-resource-type="attachment" data-linked-resource-default-alias="CVE-2015-5344.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain" data-linked-resource-container-id="34833933" data-linked-resource-container-version="18">CVE-2015-5344</a>&#160;-&#160;Apache Camel's XStream usage is vulnerable&#160;to Remote Code Execution attacks.</li><li><a shape="rect" href="security-advisories.data/CVE-2015-5348.txt.asc?version=1&amp;modificationDate=1450340845000&amp;api=v2" data-linked-resource-id="61333112" data-linked-resource-version="1" data-linked-resource-type="attachment" data-linke
 d-resource-default-alias="CVE-2015-5348.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain" data-linked-resource-container-id="34833933" data-linked-resource-container-version="18">CVE-2015-5348</a> - Apache Camel's Jetty/Servlet usage is vulnerable to Java object de-serialisation vulnerability.</li><li><a shape="rect" href="security-advisories.data/CVE-2015-0264.txt.asc?version=1&amp;modificationDate=1426539191000&amp;api=v2" data-linked-resource-id="54165590" data-linked-resource-version="1" data-linked-resource-type="attachment" data-linked-resource-default-alias="CVE-2015-0264.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain" data-linked-resource-container-id="34833933" data-linked-resource-container-version="18">CVE-2015-0264</a> - The XPath handling in Apache Camel for invalid XML Strings or invalid XML GenericFile objects allows remote attackers to read arbitrary files via an XML External Entity (XXE) declaration
 . The XML External Entity (XXE) will be resolved before the Exception is thrown.</li><li><a shape="rect" href="security-advisories.data/CVE-2015-0263.txt.asc?version=1&amp;modificationDate=1426539178000&amp;api=v2" data-linked-resource-id="54165589" data-linked-resource-version="1" data-linked-resource-type="attachment" data-linked-resource-default-alias="CVE-2015-0263.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain" data-linked-resource-container-id="34833933" data-linked-resource-container-version="18">CVE-2015-0263</a> - The XML converter setup in Apache Camel allows remote attackers to read arbitrary files via an SAXSource containing an XML External Entity (XXE) declaration.</li></ul><h3 id="SecurityAdvisories-2014">2014</h3><ul><li><a shape="rect" href="security-advisories.data/CVE-2014-0003.txt.asc?version=1&amp;modificationDate=1393615582000&amp;api=v2" data-linked-resource-id="40009835" data-linked-resource-version="1" data-linked-resource-t
 ype="attachment" data-linked-resource-default-alias="CVE-2014-0003.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain" data-linked-resource-container-id="34833933" data-linked-resource-container-version="18">CVE-2014-0003</a> - The Apache Camel XSLT component allows XSL stylesheets to perform calls to external Java methods.</li><li><a shape="rect" href="security-advisories.data/CVE-2014-0002.txt.asc?version=1&amp;modificationDate=1393615569000&amp;api=v2" data-linked-resource-id="40009834" data-linked-resource-version="1" data-linked-resource-type="attachment" data-linked-resource-default-alias="CVE-2014-0002.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain" data-linked-resource-container-id="34833933" data-linked-resource-container-version="18">CVE-2014-0002</a> - The Apache Camel XSLT component will resolve entities in XML messages when transforming them using an xslt route.</li></ul><h3 id="SecurityAdvisories-2013">2
 013</h3><ul><li><a shape="rect" href="security-advisories.data/CVE-2013-4330.txt.asc?version=1&amp;modificationDate=1380633919000&amp;api=v2" data-linked-resource-id="35192841" data-linked-resource-version="1" data-linked-resource-type="attachment" data-linked-resource-default-alias="CVE-2013-4330.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain" data-linked-resource-container-id="34833933" data-linked-resource-container-version="18">CVE-2013-4330</a> - Writing files using FILE or FTP components, can potentially be exploited by a malicious user.</li></ul><p>&#160;</p></div>
+<div class="wiki-content maincontent"><h3 id="SecurityAdvisories-2018">2018</h3><ul><li><a shape="rect" href="security-advisories.data/CVE-2018-8027.txt.asc?version=4&amp;modificationDate=1533020841000&amp;api=v2" data-linked-resource-id="89065844" data-linked-resource-version="4" data-linked-resource-type="attachment" data-linked-resource-default-alias="CVE-2018-8027.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain" data-linked-resource-container-id="34833933" data-linked-resource-container-version="18">CVE-2018-8027</a><a shape="rect" href="security-advisories.data/CVE-2018-8027.txt.asc?version=4&amp;modificationDate=1533020841000&amp;api=v2" data-linked-resource-id="89065844" data-linked-resource-version="4" data-linked-resource-type="attachment" data-linked-resource-default-alias="CVE-2018-8027.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain" data-linked-resource-container-id="34833933" data-linked-resource-conta
 iner-version="18">&#160;</a>-&#160;Apache Camel's Core is vulnerable to XXE in XSD validation processor</li></ul><h3 id="SecurityAdvisories-2017">2017</h3><ul><li><a shape="rect" href="security-advisories.data/CVE-2017-12634.txt.asc?version=1&amp;modificationDate=1510733922000&amp;api=v2" data-linked-resource-id="74687198" data-linked-resource-version="1" data-linked-resource-type="attachment" data-linked-resource-default-alias="CVE-2017-12634.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain" data-linked-resource-container-id="34833933" data-linked-resource-container-version="18">CVE-2017-12634</a>&#160;- Apache Camel's Castor unmarshalling operation is vulnerable to Remote Code Execution attacks</li><li><a shape="rect" href="security-advisories.data/CVE-2017-12633.txt.asc?version=1&amp;modificationDate=1510733921000&amp;api=v2" data-linked-resource-id="74687197" data-linked-resource-version="1" data-linked-resource-type="attachment" data-linked-reso
 urce-default-alias="CVE-2017-12633.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain" data-linked-resource-container-id="34833933" data-linked-resource-container-version="18">CVE-2017-12633</a>&#160;- Apache Camel's Hessian unmarshalling operation is vulnerable to Remote Code Execution attacks</li><li><a shape="rect" href="security-advisories.data/CVE-2017-5643.txt.asc?version=1&amp;modificationDate=1489652454000&amp;api=v2" data-linked-resource-id="68719271" data-linked-resource-version="1" data-linked-resource-type="attachment" data-linked-resource-default-alias="CVE-2017-5643.txt.asc" data-linked-resource-content-type="application/pgp-encrypted" data-linked-resource-container-id="34833933" data-linked-resource-container-version="18">CVE-2017-5643</a>&#160;-&#160;Apache Camel's Validation Component is vulnerable against SSRF via remote DTDs and XXE</li><li><a shape="rect" href="security-advisories.data/CVE-2017-3159.txt.asc?version=1&amp;modificatio
 nDate=1486565167000&amp;api=v2" data-linked-resource-id="67641933" data-linked-resource-version="1" data-linked-resource-type="attachment" data-linked-resource-default-alias="CVE-2017-3159.txt.asc" data-linked-resource-content-type="application/pgp-encrypted" data-linked-resource-container-id="34833933" data-linked-resource-container-version="18">CVE-2017-3159</a>&#160;-&#160;Apache Camel's Snakeyaml unmarshalling operation is vulnerable to Remote Code Execution attacks</li></ul><h3 id="SecurityAdvisories-2016">2016</h3><ul><li><a shape="rect" href="security-advisories.data/CVE-2016-8749.txt.asc?version=2&amp;modificationDate=1486565034000&amp;api=v2" data-linked-resource-id="67641927" data-linked-resource-version="2" data-linked-resource-type="attachment" data-linked-resource-default-alias="CVE-2016-8749.txt.asc" data-linked-resource-content-type="application/pgp-encrypted" data-linked-resource-container-id="34833933" data-linked-resource-container-version="18">CVE-2016-8749</a>&#1
 60;-&#160;Apache Camel's Jackson and JacksonXML unmarshalling operation are vulnerable to Remote Code Execution attacks</li></ul><h3 id="SecurityAdvisories-2015">2015</h3><ul><li><a shape="rect" href="security-advisories.data/CVE-2015-5344.txt.asc?version=1&amp;modificationDate=1454056803000&amp;api=v2" data-linked-resource-id="61338184" data-linked-resource-version="1" data-linked-resource-type="attachment" data-linked-resource-default-alias="CVE-2015-5344.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain" data-linked-resource-container-id="34833933" data-linked-resource-container-version="18">CVE-2015-5344</a>&#160;-&#160;Apache Camel's XStream usage is vulnerable&#160;to Remote Code Execution attacks.</li><li><a shape="rect" href="security-advisories.data/CVE-2015-5348.txt.asc?version=1&amp;modificationDate=1450340845000&amp;api=v2" data-linked-resource-id="61333112" data-linked-resource-version="1" data-linked-resource-type="attachment" data-linke
 d-resource-default-alias="CVE-2015-5348.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain" data-linked-resource-container-id="34833933" data-linked-resource-container-version="18">CVE-2015-5348</a> - Apache Camel's Jetty/Servlet usage is vulnerable to Java object de-serialisation vulnerability.</li><li><a shape="rect" href="security-advisories.data/CVE-2015-0264.txt.asc?version=1&amp;modificationDate=1426539191000&amp;api=v2" data-linked-resource-id="54165590" data-linked-resource-version="1" data-linked-resource-type="attachment" data-linked-resource-default-alias="CVE-2015-0264.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain" data-linked-resource-container-id="34833933" data-linked-resource-container-version="18">CVE-2015-0264</a> - The XPath handling in Apache Camel for invalid XML Strings or invalid XML GenericFile objects allows remote attackers to read arbitrary files via an XML External Entity (XXE) declaration
 . The XML External Entity (XXE) will be resolved before the Exception is thrown.</li><li><a shape="rect" href="security-advisories.data/CVE-2015-0263.txt.asc?version=1&amp;modificationDate=1426539178000&amp;api=v2" data-linked-resource-id="54165589" data-linked-resource-version="1" data-linked-resource-type="attachment" data-linked-resource-default-alias="CVE-2015-0263.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain" data-linked-resource-container-id="34833933" data-linked-resource-container-version="18">CVE-2015-0263</a> - The XML converter setup in Apache Camel allows remote attackers to read arbitrary files via an SAXSource containing an XML External Entity (XXE) declaration.</li></ul><h3 id="SecurityAdvisories-2014">2014</h3><ul><li><a shape="rect" href="security-advisories.data/CVE-2014-0003.txt.asc?version=1&amp;modificationDate=1393615582000&amp;api=v2" data-linked-resource-id="40009835" data-linked-resource-version="1" data-linked-resource-t
 ype="attachment" data-linked-resource-default-alias="CVE-2014-0003.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain" data-linked-resource-container-id="34833933" data-linked-resource-container-version="18">CVE-2014-0003</a> - The Apache Camel XSLT component allows XSL stylesheets to perform calls to external Java methods.</li><li><a shape="rect" href="security-advisories.data/CVE-2014-0002.txt.asc?version=1&amp;modificationDate=1393615569000&amp;api=v2" data-linked-resource-id="40009834" data-linked-resource-version="1" data-linked-resource-type="attachment" data-linked-resource-default-alias="CVE-2014-0002.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain" data-linked-resource-container-id="34833933" data-linked-resource-container-version="18">CVE-2014-0002</a> - The Apache Camel XSLT component will resolve entities in XML messages when transforming them using an xslt route.</li></ul><h3 id="SecurityAdvisories-2013">2
 013</h3><ul><li><a shape="rect" href="security-advisories.data/CVE-2013-4330.txt.asc?version=1&amp;modificationDate=1380633919000&amp;api=v2" data-linked-resource-id="35192841" data-linked-resource-version="1" data-linked-resource-type="attachment" data-linked-resource-default-alias="CVE-2013-4330.txt.asc" data-nice-type="Text File" data-linked-resource-content-type="text/plain" data-linked-resource-container-id="34833933" data-linked-resource-container-version="18">CVE-2013-4330</a> - Writing files using FILE or FTP components, can potentially be exploited by a malicious user.</li></ul><p>&#160;</p></div>
         </td>
         <td valign="top">
           <div class="navigation">

Modified: websites/production/camel/content/siteindex.html
==============================================================================
--- websites/production/camel/content/siteindex.html (original)
+++ websites/production/camel/content/siteindex.html Fri Sep  7 07:31:26 2018
@@ -92,14 +92,14 @@
 <div class="wiki-content maincontent">
 <span class="conf-macro output-inline" data-hasbody="true" data-macro-name="unmigrated-inline-wiki-markup"></span><h2>Space Index</h2>
 <div class="index-macro-info">
-    <h4>Total number of pages: 953</h4>
+    <h4>Total number of pages: 954</h4>
             <span class="excerpt-info">
             <span class="aui-icon aui-icon-small aui-iconfont-info">info</span>
             Page excerpts are hidden because there are more than 200 pages
         </span>
     </div>
 <table class="grid" width="99%" cellspacing="0"><tbody><tr><td colspan="2" rowspan="1">
-         <table width="100%"><tbody><tr><td colspan="1" rowspan="1"><a shape="rect" href="#index-0-9">0-9</a> ... 0</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-A">A</a> ... 39</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-B">B</a> ... 43</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-C">C</a> ... 216</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-D">D</a> ... 32</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-E">E</a> ... 33</td></tr><tr><td colspan="1" rowspan="1"><a shape="rect" href="#index-F">F</a> ... 15</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-G">G</a> ... 33</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-H">H</a> ... 88</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-I">I</a> ... 19</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-J">J</a> ... 32</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-K">K</a> ... 6</td></tr><tr><td colspan=
 "1" rowspan="1"><a shape="rect" href="#index-L">L</a> ... 20</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-M">M</a> ... 36</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-N">N</a> ... 12</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-O">O</a> ... 7</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-P">P</a> ... 27</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-Q">Q</a> ... 5</td></tr><tr><td colspan="1" rowspan="1"><a shape="rect" href="#index-R">R</a> ... 33</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-S">S</a> ... 90</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-T">T</a> ... 44</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-U">U</a> ... 19</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-V">V</a> ... 8</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-W">W</a> ... 30</td></tr><tr><td colspan="1" rowspan="1"><a shape="rect" href="#index-X">X</a> ... 
 14</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-Y">Y</a> ... 2</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-Z">Z</a> ... 4</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-%21@%23%24">!@#$</a> ... 0</td><td colspan="1" rowspan="1">&#160;</td><td colspan="1" rowspan="1">&#160;</td></tr></tbody></table>
+         <table width="100%"><tbody><tr><td colspan="1" rowspan="1"><a shape="rect" href="#index-0-9">0-9</a> ... 0</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-A">A</a> ... 39</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-B">B</a> ... 43</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-C">C</a> ... 217</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-D">D</a> ... 32</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-E">E</a> ... 33</td></tr><tr><td colspan="1" rowspan="1"><a shape="rect" href="#index-F">F</a> ... 15</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-G">G</a> ... 33</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-H">H</a> ... 88</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-I">I</a> ... 19</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-J">J</a> ... 32</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-K">K</a> ... 6</td></tr><tr><td colspan=
 "1" rowspan="1"><a shape="rect" href="#index-L">L</a> ... 20</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-M">M</a> ... 36</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-N">N</a> ... 12</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-O">O</a> ... 7</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-P">P</a> ... 27</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-Q">Q</a> ... 5</td></tr><tr><td colspan="1" rowspan="1"><a shape="rect" href="#index-R">R</a> ... 33</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-S">S</a> ... 90</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-T">T</a> ... 44</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-U">U</a> ... 19</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-V">V</a> ... 8</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-W">W</a> ... 30</td></tr><tr><td colspan="1" rowspan="1"><a shape="rect" href="#index-X">X</a> ... 
 14</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-Y">Y</a> ... 2</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-Z">Z</a> ... 4</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-%21@%23%24">!@#$</a> ... 0</td><td colspan="1" rowspan="1">&#160;</td><td colspan="1" rowspan="1">&#160;</td></tr></tbody></table>
         </td></tr><tr valign="top"><td colspan="1" rowspan="1"><h4 style="margin-top: 0px"><a shape="rect" name="index-0-9"></a>0-9</h4>
         </td><td colspan="1" rowspan="1"><h4 style="margin-top: 0px"><a shape="rect" name="index-A"></a>A</h4>
                              <span class="icon aui-icon content-type-page" title="Page">Page:</span>                 <a shape="rect" href="acknowledgment.html">Acknowledgment</a>
@@ -454,6 +454,8 @@
         <br clear="none">
                                          <span class="icon aui-icon content-type-page" title="Page">Page:</span>                 <a shape="rect" href="camel-2221-release.html">Camel 2.22.1 Release</a>
         <br clear="none">
+                                         <span class="icon aui-icon content-type-page" title="Page">Page:</span>                 <a shape="rect" href="camel-2222-release.html">Camel 2.22.2 Release</a>
+        <br clear="none">
                                          <span class="icon aui-icon content-type-page" title="Page">Page:</span>                 <a shape="rect" href="camel-2230-release.html">Camel 2.23.0 Release</a>
         <br clear="none">
                                          <span class="icon aui-icon content-type-page" title="Page">Page:</span>                 <a shape="rect" href="camel-23-overhaul-of-aggregator-eip.html">Camel 2.3 - Overhaul of Aggregator EIP</a>