Como documentado aqui :
If you have a symlink in a world writeable directory that has the sticky bit set so that only the owner of a file can delete it (for example, /tmp), only the owner of a symlink can dereference it. Everyone else will get EACCES on any operation that attempts to do so, including things like attempting to stat() the symlink. If this is happening to you, your Ubuntu kernel will log messages like:
non-matching-uid symlink following attempted in sticky world-writable directory by cat (fsuid 915 != 2315)
yama_inode_follow_link: 16 callbacks suppressed
A correção é transformar kernel.yama.protected_sticky_symlinks
em 0 (desativado).
Para fazer isso temporariamente (para testar se isso resolve o problema):
sudo -i
echo 0 > /proc/sys/kernel/yama/protected_sticky_symlinks
Para tornar a mudança permanente (a partir da próxima reinicialização), adicione uma linha ao seu arquivo sysctl.conf:
echo "kernel.yama.protected_sticky_symlinks = 0" | sudo tee -a /etc/sysctl.conf