I hate to repeat myself, but: Any exploit that allows execution of code in a user's own context can be escalated to root access by this exploit.
So.. Your PDF reader has an exploit that allows code execution. Without the dyld bug, the PDF bug only allows code to execute in the user's context. With the dyld bug, the PDF bug can give itself passwordless sudo access, and execute shell commands as root.