If you look at the Heartbleed summary:
The Heartbleed Bug is a serious vulnerability in the popular OpenSSL
cryptographic software library. This weakness allows stealing the
information protected, under normal conditions, by the SSL/TLS
encryption used to secure the Internet. SSL/TLS provides communication
security and privacy over the Internet for applications such as web,
email, instant messaging (IM) and some virtual private networks
(VPNs).
The Heartbleed bug allows anyone on the Internet to read the memory of
the systems protected by the vulnerable versions of the OpenSSL
software. This compromises the secret keys used to identify the
service providers and to encrypt the traffic, the names and passwords
of the users and the actual content. This allows attackers to
eavesdrop on communications, steal data directly from the services and
users and to impersonate services and users.
You asked:
Does it mean that Heartbleed bug would change the degree of promise
toward SSL/TLS ?
No it doesn't. You can see it's specifically about openssl. Heartbleed was a software bug, a programing error. It was not a weakness in the SSL/TLS protocol itself, like for instance CRIME or BEAST. The important lesson we learned from Heartbleed is that code should be reviewed prior to its usage. The memory leak in OpenSSL was a significant one, but programing errors exist and will exist in the future. All we can do is perform regular code reviews and simplify/clean code (OpenSSL is a bit of a mess).
The other libraries (actually any piece of software for that matter) could have easily had one as well, the main threat here is human error, which is sometimes hard to mitigate.