new file mode 100644
@@ -0,0 +1,73 @@
+From cd046f6c93b39d673a58c18648d8906e954c4f5d Mon Sep 17 00:00:00 2001
+From: Daniel Stenberg <daniel@haxx.se>
+Date: Wed, 17 Dec 2025 10:54:16 +0100
+Subject: [PATCH] openssl: toggling CURLSSLOPT_NO_PARTIALCHAIN makes a
+ different CA cache
+
+Reported-by: Stanislav Fort
+
+Closes #20009
+
+CVE: CVE-2025-14819
+Upstream-Status: Backport [https://github.com/curl/curl/commit/cd046f6c93b39d673a58c18648d8906e954c4f5d]
+Signed-off-by: Peter Marko <peter.marko@siemens.com>
+---
+ lib/vtls/openssl.c | 12 ++++++++++--
+ 1 file changed, 10 insertions(+), 2 deletions(-)
+
+diff --git a/lib/vtls/openssl.c b/lib/vtls/openssl.c
+index a7f169d641..7563d9a090 100644
+--- a/lib/vtls/openssl.c
++++ b/lib/vtls/openssl.c
+@@ -3560,6 +3560,7 @@ struct ossl_x509_share {
+ X509_STORE *store; /* cached X509 store or NULL if none */
+ struct curltime time; /* when the cached store was created */
+ BIT(store_is_empty); /* no certs/paths/blobs are in the store */
++ BIT(no_partialchain); /* keep partial chain state */
+ };
+
+ static void oss_x509_share_free(void *key, size_t key_len, void *p)
+@@ -3594,12 +3595,16 @@ ossl_cached_x509_store_expired(const struct Curl_easy *data,
+
+ static bool
+ ossl_cached_x509_store_different(struct Curl_cfilter *cf,
++ const struct Curl_easy *data,
+ const struct ossl_x509_share *mb)
+ {
+ struct ssl_primary_config *conn_config = Curl_ssl_cf_get_primary_config(cf);
++ struct ssl_config_data *ssl_config =
++ Curl_ssl_cf_get_config(cf, CURL_UNCONST(data));
++ if(mb->no_partialchain != ssl_config->no_partialchain)
++ return TRUE;
+ if(!mb->CAfile || !conn_config->CAfile)
+ return mb->CAfile != conn_config->CAfile;
+-
+ return strcmp(mb->CAfile, conn_config->CAfile);
+ }
+
+@@ -3618,7 +3623,7 @@ static X509_STORE *ossl_get_cached_x509_store(struct Curl_cfilter *cf,
+ sizeof(MPROTO_OSSL_X509_KEY)-1) : NULL;
+ if(share && share->store &&
+ !ossl_cached_x509_store_expired(data, share) &&
+- !ossl_cached_x509_store_different(cf, share)) {
++ !ossl_cached_x509_store_different(cf, data, share)) {
+ store = share->store;
+ *pempty = share->store_is_empty;
+ }
+@@ -3657,6 +3662,8 @@ static void ossl_set_cached_x509_store(struct Curl_cfilter *cf,
+
+ if(X509_STORE_up_ref(store)) {
+ char *CAfile = NULL;
++ struct ssl_config_data *ssl_config =
++ Curl_ssl_cf_get_config(cf, CURL_UNCONST(data));
+
+ if(conn_config->CAfile) {
+ CAfile = strdup(conn_config->CAfile);
+@@ -3675,6 +3682,7 @@ static void ossl_set_cached_x509_store(struct Curl_cfilter *cf,
+ share->store = store;
+ share->store_is_empty = is_empty;
+ share->CAfile = CAfile;
++ share->no_partialchain = ssl_config->no_partialchain;
+ }
+ }
+
@@ -17,6 +17,7 @@ SRC_URI = " \
file://CVE-2025-13034.patch \
file://CVE-2025-14017.patch \
file://CVE-2025-14524.patch \
+ file://CVE-2025-14819.patch \
"
SRC_URI:append:class-nativesdk = " \