Looks like they were xfering through your Linode this game:
http://www.torrentz.com/torrent_381534.html
They may have exploited some portion of MySQL
through phpMyAdmin, using a database called
remoteshell:
84.159.66.132 - - [30/Dec/2005:19:21:57 -0500] "GET /phpmyadmin/sql.php?lang=de-utf-8&server=1&collation_connection=utf8_general_ci&
db=remoteshell&goto=db_details_structure.php&sql_query=DROP+DATABASE+
%60remoteshell%60&zero_rows=Datenbank+%60remoteshell%60+wurde+gel%C3%B6scht.&goto=main.php&back=db_details_structure.php&reload=1&purge=1&is_js_confirmed=1 HTTP/1.1" 200 6635 "http://www.avella.name/ph
pmyadmin/db_details_structure.php?lang=de-utf-8&server=1&collation_connection=utf8_general_ci&db=remoteshell" "Mozilla/5.0 (Windows; U; Windows NT 5.1; de; rv:1.8) Gecko/20051111 Firefox/1.5"
Then they restored a database dump via POST:
84.159.66.132 - - [30/Dec/2005:19:22:20 -0500] "POST /phpmyadmin/read_dump.php HTTP/1.1" 200 4760 "http://www.avella.name/phpmyadmin/db_details.php?lang=de-utf-8&server=1&collation_connection=utf8_gene
ral_ci&db=mysql&goto=db_details_structure.php&db_query_force=1" "Mozilla/5.0 (Windows; U; Windows NT 5.1; de; rv:1.8) Gecko/20051111 Firefox/1.5"
And they did another database dump via POST, which somehow resulted in /old.php getting created.
Because access logs don't log POST data, I can't tell exactly what happened, but I can make an educated guess. The above wget command in the error logs were probally caused by phpmyadmin.css.php, mis-parsing the contents of a database in MySQL. It looks like it may have made PHP execute some PHP code that resided in the remoteshell database.
Can you dump that database to a text file if you've still got it?
[will edit later with more info dug up]