You could create a firewall rule to block this traffic, but it's much easier to enable reverse-path filtering instead.
(root)$ echo 1 > /proc/sys/net/ipv4/conf/eth0/rp_filter
Reverse-path filtering uses routing tables to filter out spoofed addresses on incoming packets.
You can enable this by default on all interfaces by adding the following to /etc/systcl.conf:
net.ipv4.conf.default.rp_filter=1
net.ipv4.conf.all.rp_filter=1
More info: http://www.slashroot.in/linux-kernel-rpfilter-settings-reverse-path-filtering
However...
As already mentioned by MadHatter, this is completely unnecessary for 127.0.0.1/8. (If you want, you can log these packets using net.ipv4.conf.all.log_martians = 1
).