I think a more long term approach would be to up the default threshold
so it doesn't fire accidentally. However, that would require more
testing than we have time for right now.

I'm giving a +1 on adding this patch. I'd like to see the git commit
sha1 in the patch header with an explanation of where the patch came
from so we can evaluate the patch easier later on.

Thanks!

** Changed in: xserver-xorg-input-synaptics (Ubuntu)
       Status: New => Triaged

** Changed in: xserver-xorg-input-synaptics (Ubuntu)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/742213

Title:
  spurious right click events

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to