--- /dev/null
+From 04b80cd29b23d02f373c095569e871275d128b43 Mon Sep 17 00:00:00 2001
+From: Willy Tarreau <w@1wt.eu>
+Date: Sat, 19 Jul 2014 06:37:33 +0200
+Subject: [PATCH 6/6] BUG/MEDIUM: connection: fix proxy v2 header again!
+
+Last commit 77d1f01 ("BUG/MEDIUM: connection: fix memory corruption
+when building a proxy v2 header") was wrong, using &cn_trash instead
+of cn_trash resulting in a warning and the client's SSL cert CN not
+being stored at the proper location.
+
+Thanks to Lukas Tribus for spotting this quickly.
+
+This should be backported to 1.5 after the patch above is backported.
+(cherry picked from commit 3b9a0c9d4d083d749846d66f9bd4caabafe4ee78)
+---
+ src/connection.c | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/src/connection.c b/src/connection.c
+index 3435b1a..2dd2c02 100644
+--- a/src/connection.c
++++ b/src/connection.c
+@@ -684,7 +684,7 @@ int make_proxy_line_v2(char *buf, int buf_len, struct server *srv, struct connec
+ }
+ if (srv->pp_opts & SRV_PP_V2_SSL_CN) {
+ cn_trash = get_trash_chunk();
+- if (ssl_sock_get_remote_common_name(remote, &cn_trash) > 0) {
++ if (ssl_sock_get_remote_common_name(remote, cn_trash) > 0) {
+ tlv_len = make_tlv(&buf[ret+ssl_tlv_len], (buf_len - ret - ssl_tlv_len), PP2_TYPE_SSL_CN, cn_trash->len, cn_trash->str);
+ ssl_tlv_len += tlv_len;
+ }
+--
+1.8.5.5
+